0)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x200, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_MTU={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 16:37:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2b, 0x7f, 0xf8, 0x49, 0x30, @local, @private2, 0x8000, 0x8000, 0x101, 0xfffffbff}}) 16:37:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8941, &(0x7f0000000280)) 16:37:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:37:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002abd7000fddbdf250100000005000d000000000008000c000400000006000e00aabf0000"], 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x20000805) 16:37:50 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x40, 0x1, 0x60, @remote, @mcast1, 0x10, 0x40, 0x513b93b4, 0x7fffffff}}) 16:37:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x894c, &(0x7f0000000280)) 16:37:50 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 16:37:50 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:37:50 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket(0x9, 0x9, 0x90b2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x42, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:37:50 executing program 3: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd2d, 0x25dfdbfb, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) 16:37:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8982, &(0x7f0000000280)) 16:37:50 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x145300, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x8001) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1800040}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x4014) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x6, 0x2, @private0, @ipv4={[], [], @multicast2}, 0x10, 0x7, 0x962a, 0xafb6}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x4, 0x48, 0x9, 0x3, 0x63, @loopback, @empty, 0x40, 0x20, 0x8a, 0xff}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x20000, 0x0) 16:37:51 executing program 4: ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000040)=0x9) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) accept4$llc(r1, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8983, &(0x7f0000000280)) 16:37:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x80, 0xbf, 0x3, 0x21, @mcast1, @private0, 0x40, 0x40, 0xfffffff8, 0x3ff}}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r1}, 0x8) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x4c200, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x4c, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x16}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}]}, 0x4c}}, 0x8800) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xfc07}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004010) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x2a, 0x1, 0x77c6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000440)={0x1ff, 0xfffffff8, 0x101, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000480)={r5}) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) 16:37:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0xb, 0x92b22db49c0bfab6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x2a, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'gre0\x00'}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:51 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89a0, &(0x7f0000000280)) 16:37:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000e67543000000000600000008000a0000000000140008006e6574706369300180000000000000000500070000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00000000ed999da21117244b5b80aebff38e7587434e6ab48b7f889c1daf79a5d77120211c9e9bdcec055f7b7f3cb810245720685b555eb3c62cf05f6c1c5325608c0f32cd39a110f34854e8a3d4c49cddc6a9e03c911d849b65ea951c31f7b15ccc2559fb9d27b8aa3259c20dc77be1e47043b1260245f2932afb52c4b306d277a5fcb1ee7dba215007b62c5320d6eea45b101791fcd935893afd40462588083b1e7f5d7ac368597b90415bf5dd2bdb3bd5468b6294348c8549334e2cf27a8940b9ff08d4393ad2f359a97ed652ed79b39aaf8e03140843f5a842a5a048b7e1e34e", @ANYRES16=r3, @ANYBLOB="000828bd7000fbdbdf250700000008000c00030000000600020001000000"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0xc0d4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) socketpair(0x2a, 0x0, 0x1ff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r6, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80849c8}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x3c, r6, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7ff}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2400c014}, 0x20004004) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x20100, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000)="78bbdd0c8a26f348676aa2629a0be4de93cd47310a38a00741b245df6c9882bb86fa80e398a01f925dc284573eb79fa153cc3bf0d2baa807d11937c43f7466226642ccc1e72022627c347f2b6d12f2002296c96d1f44be79e8e98ac20f41a9a73403184ab976c3851a4db08d23c2ce5d92368a431d67a2f9b9d597dddcfccab479930dbab337976439e9bbf095900bb18098c5c73b5038b860c42d6afb97821d2d04120b1720bcee433ddc5865f72baf5a36fea1003a5731db987766dd5dfe596d5fdb2158086b39d27ad6c00a105da8b5c12ef4817004", &(0x7f0000000140)=@udp=r2, 0x1}, 0x20) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00', 0xffffffffffffffff) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x210202, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000004c0)='tls\x00', 0x4) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x0, 0x2, 0x8, @mcast2, @empty, 0x8000, 0x20, 0x0, 0x5c7}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000440)={'syztnl0\x00', &(0x7f00000003c0)={'syztnl0\x00', r5, 0x29, 0x4, 0x4, 0x8, 0x45, @local, @empty, 0x80, 0x8, 0x3, 0xbe9}}) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@bridge_delneigh={0x28, 0x1d, 0x100, 0x70bd2b, 0x25dfdbfc, {0xa, 0x0, 0x0, r5, 0x8, 0x1, 0x6}, [@NDA_DST_MAC={0xa, 0x1, @random="359e83282fe5"}]}, 0x28}, 0x1, 0x0, 0x0, 0x44}, 0x81) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x2c, r4, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20064001}, 0x8000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89a1, &(0x7f0000000280)) [ 3154.440716][T19134] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x8, 0x5, 0x4, @mcast2, @private0, 0x10, 0x700, 0x5, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6tnl0\x00', r1, 0x4, 0x9, 0x80, 0x7, 0x0, @remote, @mcast1, 0x1, 0x1, 0x80000000, 0x8}}) getsockopt$inet6_udp_int(r0, 0x11, 0xe, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89f0, &(0x7f0000000280)) 16:37:51 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xa40, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x62082, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0x0, 0x14, 0x0, "5fee8bed3ff71e0229b2751885e354fc7bd5a6a69b807d3acd14715f09312586a0bf759f79a3dc7546bb7910e94e5700ea370fe7957f8344fa62dd153708423a342cee0ffc9d59f11bf9558fa3860614"}, 0xd8) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x5, 0x35a3, 0x7b, @dev={0xfe, 0x80, [], 0x44}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x7, 0x2, 0x7}}) 16:37:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="06cfeb72c0c27939e0d38cf14bb72dd73222145c399746c046ab312b15bf7f4e3161054f07011511e04d5dacd97f971377fd55c68fdb304ea4bca1898697a2d8e5c14951d3fa8ccc204fef21d475ccd61465a603744c505d4c215b33c3a7a82d4c3772e12b7232f979eeaf3484b70fd215ee5f5666f46f7160b749c077760b0db3033512c9512371bd97c147d3d6d15dae51b6c3ae517794c98cc41587643b6fccb47930f70b107322898d38", &(0x7f0000000100)=@buf="4de33fa6975dd9d41e85b25a768407879e3e61f47ce27e2e684efe5403b142b42cc46473f556c834853e0b09d61bd65085462aa960b7e7a4c5f6da14d7f96dd0c75d766bf48dbafd1993ab7101e7ce1b941a8f51925a3cc3ed0f0ea29c71431d7f07d44c9f991af56f15d2b89a26f8", 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x8, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89f6, &(0x7f0000000280)) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_delroute={0x30, 0x19, 0xd07, 0x70bd2b, 0x25dfdbff, {0x1c, 0x14, 0x80, 0xc0, 0xfd, 0x2, 0xfd, 0xa, 0x3700}, [@RTA_VIA={0x14, 0x12, {0x2b, "238e0689b095c6aecdc3c8120616"}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x84) 16:37:51 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9c6ea682b09411d196c4466ed5c0426a241e23a0a9e1089d831321bbbfda0f5ddf490ba155053b108f5c8e1ad1959d488df820c9928fae074f4f91553a612fbd89c2e3a098fe5be05a8926b8041d60569ce1106fcb7b1554a9", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25010000000c000f0005000000000000000600030002000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000c0}, 0x24040010) getsockname$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x10) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x20068000}, 0x4800) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400448c9, &(0x7f0000000280)) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$HIDIOCSUSAGE(r1, 0x4018480c, &(0x7f0000000040)={0x2, 0x3, 0x20, 0x7f, 0xffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0xff, 0x91, 0x5, 0x59, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1={0xfc, 0x1, [], 0x1}, 0x8, 0x80, 0x5e, 0x5}}) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r7, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}}, 0x40000c0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x20, 0x1, 0x8c, 0x200, {{0x16, 0x4, 0x2, 0x2, 0x58, 0x67, 0x0, 0x1, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@end, @timestamp_addr={0x44, 0xc, 0x41, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0xe}, 0xc8}]}, @timestamp={0x44, 0x20, 0x7b, 0x0, 0x3, [0x6, 0x5d2, 0x6, 0x7a4e, 0x9, 0x7, 0xab]}, @timestamp_addr={0x44, 0x14, 0xce, 0x1, 0x7, [{@multicast2, 0x9}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x2}]}, @noop]}}}}}) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400448dd, &(0x7f0000000280)) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x2f, 0x0, 0x3f, 0x1, 0x2c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, 0x20, 0x8, 0x3}}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'syztnl0\x00', r1, 0x29, 0x3, 0x8, 0xffff, 0xc89330ef8c7e5bd0, @private2, @mcast1, 0x40, 0x8000, 0x0, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="74faef6000e13be3ca02b288d3474681", @ANYRES32=r1, @ANYBLOB="78000080800000000000040140a10040006800003f049078e0000002ac14142a830e82fcef6f81d85db2772d7049831b3b64010101ac1414bbac141428ac1e010100000000e0000001000000"]}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400454ca, &(0x7f0000000280)) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x414000) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xb0}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8c}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x81}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xff}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x2400c810}, 0x408c0) 16:37:51 executing program 0: bind$isdn(0xffffffffffffffff, &(0x7f0000000000)={0x22, 0x81, 0x1, 0x7, 0x8}, 0x6) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, [], 0x1}}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3ff}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7ff}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x800}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x303}, "9ff49ae550736f47", "77c57433ec15fc95f94218e19aaf5345", "e49c9d0e", "97af9da67197c872"}, 0x28) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x40049409, &(0x7f0000000280)) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f0000000040)=""/118, 0x76, &(0x7f00000001c0)={&(0x7f00000000c0)={'tgr128-generic\x00'}, &(0x7f0000000100)="79fcc2faf838b2b5db2469a7c9c5dd8d37ae26b636584313211cdb6d2135353e8a32316f82dde62546e5bebcb5594dad166f75582c64cc5f453cb5c26ff92ba7a211ec5951e61f1b67fb8a09b988382a7befed0c5d8384dbc1f9967d5108cac95efc38f4d48637ac67cbf2d671818c95419bf4108b2ee550a07e460596095d6184", 0x81}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4000, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x40186366, &(0x7f0000000280)) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfa, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4046810) 16:37:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 16:37:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x4020940d, &(0x7f0000000280)) 16:37:51 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:51 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCSREPORT(r1, 0x400c4808, &(0x7f0000000000)={0x2, 0x3, 0x6}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80047c05, &(0x7f0000000280)) 16:37:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}, @L2TP_ATTR_DEBUG={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x8010) 16:37:52 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000040)) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80086301, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80108906, &(0x7f0000000280)) 16:37:52 executing program 4: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x20100) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, 0x4, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_HOOK={0x44, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'netpci0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_DEV={0x14, 0x3, 'team_slave_1\x00'}]}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x400}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20040005}, 0x40001) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r4, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xf8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000080}, 0x4004040) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1e, 0xa, &(0x7f0000000140)=@raw=[@call={0x85, 0x0, 0x0, 0x65}, @generic={0x81, 0x4, 0xa, 0x9, 0x4000000}, @ldst={0x1, 0x2, 0x3, 0x3, 0x9, 0x100, 0x8}, @generic={0x0, 0x9, 0x2, 0x8001, 0x9}, @alu={0x4, 0x1, 0xd, 0x0, 0x0, 0x4, 0xfffffffffffffffc}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x93f}, @generic={0x7f, 0x4, 0xf, 0xd6b7, 0x8854}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x86, &(0x7f0000000200)=""/134, 0x40f00, 0x10, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x81, 0x9}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000003c0)={r1, r2, 0x0, r3}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)="312aa0027a588342460c7ac588753980655edc5ba0a7f2e7094919277f18bc2431bf2f6241905b10e4519576994ef7d3b63d9e8425e78434f87f45bd366c14de7a1ace46f674f169e55cdccef05314ccbf3d0e9de459ffad2a5345ef0f42a000069da3a378da683ab1d5ba164e196a1cd620f9412475c0eaf4e323c1a29e962867b6af192bde6d379211ca03b3c4a011a421aeaca35f102349da9cac6884a62f7210ca37269d3db5503624ac4c17cf4edc563a8d", &(0x7f00000000c0)=@udp, 0x1}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:52 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:52 executing program 1: ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80108907, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="988d5ce8", @ANYRES16=0x0, @ANYBLOB="24012abd7000fcdbdf2502000000050005000100000006001a004e22000008001900e0000002050005000100000008000a00040000000500050000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x4040) 16:37:52 executing program 4: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/7, 0x7}, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$NFT_MSG_GETTABLE(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="24000000010a01040000000000000000030000070800024000000000080002400000000043c983190da6db49733d58d84e086cd3e50b4d9f653843d58cc882ff807782165041afb3cbb185ba527f4f8501e98f8d8e423f152df6a064caebb8284229f79acef72e3f5822e1461e43dd4b16b317b9540757d0b5c07492d01a04e90eb257cab263b57cf41084f049696f992950026647c64170db81a495cc6fd52e945a6620220ad620f41ac21a1dbb2493eefcac6fb9a42c38c5aaf2a228f932fcda1a8e86c4d319c8462953bc87147357c8e80d0e74"], 0x24}}, 0x4048001) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r2, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004004}, 0x4008000) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x81f8943c, &(0x7f0000000280)) 16:37:52 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0xfffffffb, 0x5, 0x1dc25a82}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f0000000040)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r2, &(0x7f00000020c0), 0x8, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0045878, &(0x7f0000000280)) 16:37:52 executing program 1: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2e}}}, 0x0, 0x0, 0x20, 0x0, "21e2f8adc23ca0e6e9a3478c11ddda257ba355ac2de8cbc903c17ce9c2bd29511b71c259600445bf264b59659f486144f1fbbcc9bb28bc1abcfca53bd299386df4793ab83ad0c3f87a064339b5087666"}, 0xd8) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x4) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000100)={'syztnl1\x00', &(0x7f00000002c0)={'ip6gre0\x00', r1, 0x2f, 0x5, 0x7f, 0xb8, 0x4, @remote, @mcast2, 0x7, 0x0, 0x0, 0xfffffffd}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) socket$nl_sock_diag(0x10, 0x3, 0x4) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x9, 0xff}, @mss={0x2, 0x4}, @timestamp, @timestamp, @timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x7f, 0x100}], 0x9) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0045878, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = syz_open_dev$hiddev(&(0x7f0000000140)='/dev/usb/hiddev#\x00', 0x5, 0x80000) ioctl$HIDIOCGCOLLECTIONINFO(r2, 0xc0104811, &(0x7f0000000180)={0x0, 0x236c, 0x5, 0x7f}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x502, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x8040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x397101, 0x0) sendmsg$AUDIT_TRIM(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x3f6, 0x8, 0x70bd25, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20008090}, 0x24000800) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd}, 0x14}}, 0x20008000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc00464b4, &(0x7f0000000280)) 16:37:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x29, 0x1, 0x5, 0x100, 0x4, @local, @mcast2, 0x20, 0x700, 0x7f, 0x6a7b}}) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = socket(0x1f, 0xa, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/input/mice\x00', 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0xf9, 0x8, 0x21, @mcast1, @rand_addr=' \x01\x00', 0x40, 0x7, 0x51, 0x7}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="65727370619130000061ef0000000000", @ANYRES32=r2, @ANYBLOB="0040008000000001000000054f1100bc006700000740907800000000e00000024454c921e0000001000000037f00000100000006e0000001000100000a01010100000008ffffffff000083f9e000000200000004e000000100000001ac1e0101ffff0000ac141417000000ff7f00000100000003441c1501ac1414bb001b8000ac1414aa0000000764010100000000010144346e23ac14142e00000009ac141412000000017f00000100006d65ac14143100000005e000000200000528ac1e010103b14f03000000"]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000240)) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0189436, &(0x7f0000000280)) 16:37:52 executing program 0: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000080), 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000200)={'gre0\x00', 0x0, 0x7, 0x40, 0x1000, 0xe8f, {{0x12, 0x4, 0x0, 0x1f, 0x48, 0x64, 0x0, 0x9, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast2, {[@ssrr={0x89, 0xf, 0x73, [@local, @private=0xa010101, @remote]}, @noop, @ra={0x94, 0x4}, @noop, @timestamp={0x44, 0x1c, 0x24, 0x0, 0xf, [0x7489, 0x2c, 0x3, 0x80000001, 0xffffff81, 0x4]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'tunl0\x00', &(0x7f0000000400)={'syztnl1\x00', r2, 0x700, 0x20, 0xcc1f, 0x3, {{0x5, 0x4, 0x2, 0x5, 0x14, 0x66, 0x0, 0x1, 0x4, 0x0, @remote, @multicast1}}}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0206434, &(0x7f0000000280)) 16:37:52 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x8d, 0x1f, 0x7, 0x4, @mcast1, @loopback, 0x40, 0x8, 0x5, 0x3ff}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x5, 0x0, 0x2}) 16:37:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc020660b, &(0x7f0000000280)) 16:37:52 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="9457bb729549a4cadce44070b14b9aee1a076d3000d5db92af012f60440dcad9a57f52a52d0255429a536974ae231311aeb7e6836fd90e8a06d94c253810e4bcbaacc73c877274bec6fb3cf0aa032d0b99b43f4882d4d695247b2ab040e85024b101ef7e2fa2780b222d15f142c451521c208f587155db", 0x77, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0}, &(0x7f0000000140)=""/8, 0x8, &(0x7f0000000240)={&(0x7f0000000180)={'nhpoly1305\x00'}, &(0x7f00000001c0)="92c930c0beafdcf0ac6961b2563cfd66e4831843e91cd3de78eb8a966d0607dc1a39430c55fa60fde7b5a84cc7013e1c6141540ae1ec2a1992899c8eb995bd5ab7a246a04ba446fcf70c8480032b592c65d6952326d6102faf44ed519f9116afc16dd623101f513111faddf88b537891a4e23039e54f", 0x76}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000280)) 16:37:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x9, 0xffff0001, 0x4a, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x30, 0x10, 0xfffffffd, 0x2}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000000)={0x24, @short}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 16:37:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x4828693337770e31, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x200}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x1) 16:37:52 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r2}, 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8916, 0x0) 16:37:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc058560f, &(0x7f0000000280)) 16:37:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x9, 0x0, 0x101, 0x3e, @loopback, @dev={0xfe, 0x80, [], 0x15}, 0x80, 0x7, 0x4, 0x918}}) 16:37:52 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x210000, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000003c0)=@gcm_128={{0x303}, "d0726cc83af5ee2f", "2a06f8b7b9a19589390800e98fe672c3", "5a78c8c8", "c66c6c610bb3ac71"}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x9f, &(0x7f0000000080)=""/159, 0x40f00, 0x10, [], 0x0, 0x24, r0, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xc, 0x80000000, 0x800}, 0x10}, 0x78) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8907, 0x0) 16:37:52 executing program 4: exit(0x900b) socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:53 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$PROG_LOAD(0x13, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 16:37:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x6}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000280)) 16:37:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000c081}, 0x20008080) 16:37:53 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0xfd, 0x7f, 0x5, 0x40, @private0={0xfc, 0x0, [], 0x1}, @ipv4={[], [], @rand_addr=0x64010100}, 0x10, 0x700, 0x200, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'gre0\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="6772654000000000000000000000000049b3dc90d8faefd582d4f8579879b5fa39399d0d5e615b160169e12712b74c9f748a5bf5858cea75392980c7b0a95c20c9a2718475a6fd80eec1df5f15e30290f9", @ANYRES32=r0, @ANYBLOB="780000800000000100000009452600940068000013299078934b6f1414aae000000244441273ffffffff000000a1ac1414aa000000d67f0000010001000100000000fffff000ac1414bbffffff7fac14143e00000000e0000001000001ff0a01010000000003891b737f000001ac141bbb00000000ac1e01017f000001e000000194040100440c291000000003000000024410428080007e6a7775142e306c9118d85f04cd71eb4224eb4f41d0f9fb4ca110385b17ee792d12aede4b26b2a846e34da98a6ea02ab74f6667f16868ce4f817a568b2b8f06fcbea51f1a5533f413041654ee4107137a5ec3"]}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000780)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r0, 0x1, 0x10, 0x6, 0x8000, {{0x6, 0x4, 0x3, 0x26, 0x18, 0x68, 0x0, 0x6, 0x4, 0x0, @broadcast, @private=0xa010102, {[@noop]}}}}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8916, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r0, 0x2f, 0x9, 0x8, 0x8, 0x38, @private0={0xfc, 0x0, [], 0x1}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x8, 0x10000, 0x6}}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r4}, 0x8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000440), &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x501200) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="73797a746e6c320000fffffff3000000", @ANYRES32=r3, @ANYBLOB="80000080000000090000008b450f0014006400004029907800000000ac141424"]}) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r4, 0x4) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000180)) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000000), &(0x7f0000000040)=0x4) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x48000, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/bsg\x00', 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x18, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000f900000000000000f1c00000183b00000300000000000000000000001831000001000000000000000000000045b12000f0ffffff18000000ea00000000000000050000001838000003000000000000002a6bc0ff100000009500000000000000"], &(0x7f0000000880)='GPL\x00', 0xffffffff, 0x4f, &(0x7f00000008c0)=""/79, 0x40f00, 0x4, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x2, 0xa, 0x1, 0x4}, 0x10, 0xffffffffffffffff, r7}, 0x78) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r6, 0x89f6, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl1\x00', r1, 0x29, 0x7, 0x3, 0x9dd4, 0x2, @ipv4={[], [], @multicast1}, @local, 0x1, 0xf, 0x3, 0x1}}) 16:37:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x3, 0x8, 0xa85, 0x0, 0x0, {0x2, 0x0, 0x5}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x18}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x840) getsockname$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f00000000c0)="d673a9d9168b77be018661afb8dd8c92620ca3311ba99b463d151af20f88962db850fa4b1fcadd59a9e8af76fa2874a88811608a283c5c0188552dcf1f7b523a19b6538aff93337028b1a46ec223fc6843907bd2dd8373a28619768508a1a31132cad34044839411f6832328db7d310e74ed6fd99a683080126b8fcf8f02776d511a36b9eff3d02d0d2ec29886b97c37fc5120ccaa82666a8ddd99be103d257355ff61e9d9d31b89471e3f84405668174243d4c091dd73bd64fd", &(0x7f0000000180)=@tcp=r2}, 0x20) 16:37:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="cf8fa2711ca6252cc6f47066a783540c0748e5aec2a8a2b113433c711176293944ad90a1dd694140d95976fff8fb5af863942e4679911f660fa4f47f4ffb976ba47c17934861ba765543d9fdd238e8ebbd3183371d1fe6a391210d2fd3d390fced2f2b2e068ed7124b71848fedb57e4f22c28b18fbe7c3f919bf7363d2cd3e7736f2eb44ceb70387cda5c940d1af31aeb9716731c0081444dd4b8893d992b54f4ebe28829b762f3f7c662fbb8d62e96698dca0424ca44d0ee78aa18bf183719b9bf9833a5e4652cde9e161256907231cb35753a1f296f337405bee240834e61e5bfbac26e285951377adbe199749940b83d28f38b0c11ca5c56c1e", 0xfb, 0xfffffffffffffff9) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f00000002c0)="061959a6c1f77437a701f5db49bdc41a03c14ee9ecee25865407d724ac407a5b659df2b4dc9508d1df016fd5cdf1237c85603221786dd8a6156aae2af173bbb75ffad08c56197a4785d6c3e56796086fd574faaa23f00cb8734e4bdb1f5361", 0x5f, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000400)="452d98b7fa89f2f684b0d6640d555ac074158a0376258f3221efd8c7ab865aca71b15f7694ae046a1a7d93ceb480fa449eae8b69c9b08f728a7fb0112e3d2141a32838eabac27496705752d7913cb537f79011bc0e7e0c39c074b5dceec3172df6e011a086b891aab4b4e227cc17b5d8731a0496e3cf8257f19ae70cfac3c099a72abfacff44237b77e3ed2624ff393f48bdf2837f32d40412e409b8b97179d9a686ee4d34d9b750db2756aa0c5e2825aa93cbe7f15a79c3599540b7556a99727d4df13ee461fdc2c84bbfb48c1f712ddcf0c2cc1b771125a52a6362635c97b32e8973fd73c0a0734bca344c0f19", 0xee, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r1, r2}, 0x0, 0x0, &(0x7f0000000500)={0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000240)={0x6bc, 0x80, 0x6}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200540, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) getsockname$llc(r3, &(0x7f0000000580)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000005c0)=0x10) 16:37:53 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000001c0)) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/btrfs-control\x00', 0x0, 0x0) socketpair(0x15, 0xa, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f00000002c0)="4acc7e00b834092f90818bcdf2a19db400bfc929a0fbd9f83411b68ae9764e7483540f21e6c807cb178f012fce4b9f10b6cf6a24481034a98b982fd2a6e83292a5234cc5c664f59d7a5c74fdbf38153e1273e07510aba4899496ddf8f01bfc18126ea9c42d713752bd45b1b04b777be0828b0a6d51137771828faddba13256ae0cfec8587c2e80ecb0177c105a8681d65addffe5a5401d9493c13b699da54dd1a924e4794c569656d9f747e37a060116ec90880d4983c92bc1be8b295b4da8665051b256372fb063b1af7581eec53325642e77fac5b440629300e220d6ab1ea5a7f6d4e196d492b2fb2631a8e946862864e7f5424112b39663ff19d094429a3ea5a04f725d8baed77e38d25bf9402ec209195b80772686246549707e9d20aecc76994683a5d7f82a1801bc38f154042b0e41644c475a1e072c0168d44b5893bd503a10c08d5f53777d4b2a0d45644d2ff7aae8f299c89bf9ef38c110403aa47749263615c63602457328b214ba1c7bfc585fa14cce739e6828087c14a7dff25724f5d7a406658b074771144a7bc6056f62969ececf4034006514910142829092e474b4a9d3f3df4da77faa45cf965a2ef2c46f1c8837a23fb6838231e7d54559d0d9c879b1ef7ba0acb830cc8f70e4e06b54101f527cbfcda49cd7f52a677c900d5b68fe40e69e28877126c96c21f293d143b69715e00b58df3504f06cea1724a1e99b4b531bda2602c27d0ccf11e475f5d362d69aafddd224c4ca9505c9788d1a888bd5a82365fc07f2ecab75912336de3333b2d2c7564c7e3c765f3900426618b0df65cd13e9dcdc7901997906d90b3245668dfa766eb1af7114ea299cde97fc75aaa027a3f72c7b7a05b4b1ddeea537134fd6119f2e365729b39c8a0891fe5068818714d63eb5f729374b6047f0a9278e1a20b43a0e179f7743bb33ad58ab93ae5b6432c4deae5dd912503a58c1a305c4eac554777c73e385789b60ccaf6c9d9b889c8dc08a60846733cea862b6c8e4da47198c2861fd2f5993d1ffe61ef1df33ad8c4dd26970e521ad327bac3ed66d0d400e3f5e7b32eac3dbc36ebaf39cb8b6bd02edab36e54f26187ef76e0004b42af7e5cf1d469ce58debd95a777735c7a72a9a054a138f819945b95a39efddbb9282518ae986f8fcea13c2569336cb2db214c98765795172afe460a6bf29a74e0df3207880a94ddcf54a95db14447fab81b8c318a84eedea81cd0d2a575fe8b058f621c6adc75d76ebf9a3d460aa643e7e97f4ad09c947371361a4f18e349f40b4b5c8e232dd6ab760fe83a3f30441e3374fa88007b18c63ca84891f80dd50557ba1f52ccdbecee71ee9528adecf0ac93cdab1fb56bdef9c969932b7dcc807cc3ee756102b29b268017cdbad9bbadabebc7e4e7e1830a96f43a40f98045681877d017ccc81d3ce857623efb50b3e224b22b613011eab23b29508ab59c8e8e66027d3453a90eaec68d25700543dc7d0dd7ca3a8d44bbdf354155a7b4a3e58e389d7c77c17c518b82b598e7021d7c9fd382390c23729120d6a22b380e44827080fe34a29a992bd598677a0504abee4cb90e959473b52a6ac0f590219a7c08939520d585273f67a72b1b517d3d7a2e47a703c2e9e452ba9ce5062966e34f897889871306abb04554883ae739ba434f54c501f1a82dccb0fb9e4b8fa77897dfe37874ac4491feeb961fd77b4ad26fd17d9c5ff1bc89823f93948edd39b307883071e1913eb502a8c14194f33233b48db18704dc6fc2c4ee121dca04cdd229e44e168d9dc33888d2fd020b3fed7bcf1afe92fe3e13441ab3030a897c65d4776ae44e736e70a8b7e918ea82a30697709358681e8c46006c5f06f549ca000630a05acab259630d13648ec4de8e65961692f37163663154f8036fddad88b0a1c5fae370a7932cf20b35bfcd145e6213ad7e4e0bfcce637d5e0770d7f9ff697bf4bc299f587ce296482ef8b39fa335c911ff551e17ca85d9d8785fc0bf76e720cc6809f0cf28db887cb24a6b86424ec026bc3c43aac3ab8cf3555c8f7680e195acedb445a444092028619ecae2e4ed68bcdfca9b93f0eddf26ddca4e2ca84df0585e5c832bb20e2765f816f254190a7fbdaddc185b50dc1f51a72c4277bf324b270e81bcd2516a82f0ab99882da23f0d027df2818b7815c3b3a1a929aa53d1d5899410464d0d80d010079184f92e9513c17817881c1e7e360486e2d24425de7453f1002c4693fd58c2f785871d0774e9b1de4c4682974154801dfb830f1f77f5db7eab7b418b33097224fbb73fdc840155a81fa59c08c33edccd60e91d9f040ea23be4507921221c7c0ccdfdfd79f4ad4861ba015992fa374227543a094757d9be9027e28a9f9bf23b540b0569a679049d5c4b8c39cb5c5e299d98ec96be408352a73d3a884d6e44a8c8fdc3f97b959d73f996c2eb48b7be5a8322845b148f59615074fb7119281d36ddf8d59f99e5c82e9ff56046059660e202ed1d1bbb0c5a092637533b620c9c54a62f5739b169859a8bd393be7a7f2743fc39e517c52ac6ecf5e6672dd01a14bf59b18094f53631b6f73060480997131fb39c205222e1acabf1f9f9194ad380eed5c877d586599302058804f8b666c236e5054f9bdad9aeddfff4d9e455dfca277d2ff6c2fc9b3700da0199a954cf5dbc752f7533a5b10b7c49f683140ca17b17f5a7f38c143674920a93f2dccf318e6b830207b80d80354da32c7c6abc901d9bd0fc22b87edd6e6cb2119b58bbe483f59b31a89e1a483eff80cce31f66bd6793d96aad3b08d1fe01a0a339f8ebcabc5c1990e7b362e78a499d88ef4fddef0fed4346c23780dd9148b66e8cc5f6f2f095869eb84c86baa2302890b489219e13132c7e636f6a8b23063579d226e6fefff1b135a5e82b4716635ed177d7b7aaa788d2b72cd9f52dd7a6b7917a680baf30e27997ee38e2e58e80038a5c2256210d1b26b5f0495c929f4a881a5559f56a25380b28402707c1809183c25a665339576dd06d22f1dae7ec1cc0718041fa29837bd0a6ca4a94c214db11204ea73a34ef555e0a18a3c8c9728383c202a19232b6020ac7fc196a988a75a226ea86da17f485e10a1f1f3ce7320389f9bf03ac11102b9753fb422064b8ed082d53268bb556a8e1526185222bade70f2658ebe2959a24f4b2784c4f078429e5f11c5b2b0846c91a179e61b8003ffc03aed2823a053127317d50098f6a9c316098f91c51f92e44909c086ec58b57fe7ba4da8fe58fb7a0ac190521affdedca436ff22f853b97c8ef853f117db8cb0ffa11bcc09f76053aab671241594e9f381ba302938028e60eeb5f27781eab042e8563d061b8b7030ff843d1ab45b69bc571db45b76691bedb675251f1809d6c1c651770d4e58a7d43a7c584f81c91c4e20337af506c1ee8dd2d513bbf70c6791c1b8168484e5d4492f18e5c3b857565647d7ceb5d7513119bca72ad72730d9a900da72f90fd9c5ed98b30a5f9f8dbb531f863de14e366489d4b8e26e7dd677592eea1c6b7e5d971dbd8668617362d97f7ed924a559d6dbd8fdcf84e9c72b3999ecde8ddeb8cb963c9cb21df9be1ed4dd31870099f1247a102136435ced6fdc74e430bf1a500d5eeb976393a22b6f47ad8cb6ec4313d4d13910b49540e039dff9e6d7d68edfa4187b169d738920907f25888e9518abfaf6348717d9ea31efa9745a69869098670ce6cad939bbe32b0eb2cbf39fcf20fdbca2f8e5ba33c3678ccd13f54022cb6569370010d4a8d48a6f0baedecff388f8d13500ac49f8a15f4388c738dafbaff9cf162751b8a2ea50f568c9677a3be694b687b58e1c7b8de24bfed8ec2d6d0b79a5b1cb41aa9a54403af2e52681d82da44fa3f46be2270d1e4f885b378b5d84e66e2193415d8bbb9f24286b33d5900fcd53edfd5e10a5ed0a8a12bc9e043dc98436fb857d901b924fd393bb5a87fb803713f54d3da410c8323f0d7dcd783a5a0327338661ea666339feadf6b96227d6a578ed00be7be5c4e54eb8a0f244ab6d6c77218538385931587c7e58f89d893e6411aa1d8f848f09238f406076b6b9b9fe0d694c5c1772e0dab2c07ee9fb4caf2a4c55f08a60261398abf56d199c9e281b77c6648938d532a24430041318387584e2f82f5401eb83603a6faccaabd9ebe84b7ceb71d05f8d8b52c442f86112fd3d5abdcb1ac8398d9a92ddbf066d96c657c5b50cf2a9d1d6f79ea31c8c48a3d727675b27f161c3a32b0101445d33cf30d579891f4cba64f12a6c6fbcd62d911e727441f6a6fd55982230e5e182b75975e4178205e222c8fc4461d2e98a53dc8ffa9df3a3af55b84c6cf8d36e2e5496d44525aba8589c439e84855f93baaec671be8cfcec68cf683dda922c971325e1856ec235736920ef479e65cc92c4989e82484575f00a21ff856af1685ce6d75554d4a0ad5c3a8943aede01c1c76010a8de340e2fa090b905e2bd4f96f03d034b5a0e16e4b9842c8b955b4637ab5a5caf72f955887bf9c9180f129b2a08dba1f7dd8d00f995a3dd217c0386c3fd42e356d3e11dd393c45b024e36ffad2ec989f97a0a24249705d5ab649b4d5ed15fd68d9383f9bd9bc6256c3862c5b2985caf1309405e676bfb99354d1336b0e01350bcc7010a793668455bc435b333a796d1dd8bed889c92af49e7a58d8bfa4c5bbd9eee2b6bcc10225db0aa474339bf17f85e5534ac69354d4aa9f8865eddf9ef06823a24e91a168b7faa62ed0de1971e1733addfe01f3d4af38b076103fe5f6ca434aed85bbf94840e0df9d2b0216b96016122b844caf28126b44f58feadc3e3e1578d67caeeeb014a5275eeec7e8e3f9a6bab056795908bf61d3ee06a45505265daf1d2fb16a23569f171e414e629f005c91cea1bdbc1b452fb708b90f423a564df5bee381d891a33e7440b43e639b4fb9d54e04b6a30aa363cdd00f67e962a163823c65f15aef82be9441091bb776dfdfea90b4a5e46d39c580f7c93cac5b0952598eb388ebb6ce71c958782e37b8bec3ba4137df5eb07c7d2e716faf52c09a9cf1be5ab54b65ae8d682386a4a01baf284f5b3e178beb9f334a849eb5fc607bacf85bc8fd35a9610eed5fa87a23b2dbe3757b4ae0867d0f071d5ce5dc9b7c4b036a52220d6c63b9f8bae3847e48017c61918c65b61a2b74d0a515aa49aabbe72905cc0ace77947397221472c6cdb1879b69db31373468845e9d6fb4d7f383d060c2a380254fd60f434f7d10c01597533eb48b3086f80c224b18fd6b0a6abc18e8712615f0be5e3b3d86562f4eddafbfbb8b4fc9c9457125de1c545cc0a464a5cd9d1630febfaeaaf18f92c97e7bc997670473aab1999db83c1448a473d15d41d70f8ff94c55710ebab6aaaa79ca566a873b398e4ce32998d63201c4a80255ee2c01cc2e611ba47091608e7c429bfb50223d93f0943598b064d71cf963ba9d7488607ef717d3fe4262c976dfb83bc751bc30fe424facff4cc5d010bab67b68bea8639622ee571ac2cb4a68802056088a13b242ebeb28610224519393293403db6b44584926b840067f852949363b1a41dc8c5082ae234c3f132f88025265ce29bb4da86cd2afec633a7d6e3dde49e5070b4eb0a57409ef1ebfb95facf6c6efdaae2c4a4739df38ed01d8340f71c3dad23b140562c528d0b970331640fb8d0bb5289207eea8895a264d3d0b1c45b4ae1b508df38f8a077f107eef96372e7392174674343504d4e03ccf4a55971712d1a9d395a13da5579a90b5c37fb9ecb4209450361ebb66de86581d26e6302843421fc", &(0x7f00000000c0)=@tcp=r2, 0x5}, 0x20) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000001380)={'ip6tnl0\x00', &(0x7f0000001300)={'syztnl0\x00', 0x0, 0x4, 0x4, 0x3, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, 0x700, 0x40, 0x6, 0x4f}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) 16:37:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x4, 0x38, 0x8c, 0x676, 0x8, @remote, @private2={0xfc, 0x2, [], 0x1}, 0x1, 0x8, 0x2, 0x9}}) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000005600000028bf7000fbdbdf2507000000", @ANYRES32=r2, @ANYBLOB], 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETTABLE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x1, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "c2f73cc453dbe4d4", "3366dc00211a7fcb86124102335e9b27", "702024ff", "66e96493ab5c9959"}, 0x28) 16:37:53 executing program 1: prctl$PR_SET_ENDIAN(0x14, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'syztnl2\x00', 0x0}) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000480)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0302}}}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() wait4(r2, &(0x7f0000000000), 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000017c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) r4 = getpid() ptrace$poke(0xffffffffffffffff, r4, 0x0, 0x0) process_vm_readv(r4, &(0x7f0000000500)=[{&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/216, 0xd8}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/57, 0x39}], 0x4, &(0x7f0000000780)=[{&(0x7f0000000540)=""/74, 0x4a}, {&(0x7f00000005c0)=""/195, 0xc3}, {&(0x7f00000006c0)=""/180, 0xb4}, {&(0x7f0000000800)=""/186, 0xba}], 0x4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x890b, &(0x7f0000000040)) 16:37:53 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x183040, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 16:37:53 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) bind$isdn(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x0, 0x4, 0x3, 0x1}, 0x6) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000500)='/dev/bsg\x00', 0x82801, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:37:53 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8916, 0x0) 16:37:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x811) 16:37:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400, 0x0) ioctl$HIDIOCGPHYS(r1, 0x80404812, &(0x7f0000000040)) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x4c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x14000}, 0x4000) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x35, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6tnl0\x00', r2, 0x29, 0x1, 0x4, 0x80000000, 0x99, @mcast1, @private0, 0x8000, 0x7, 0x1d, 0x3}}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r4, 0x11, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0x4) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000440)={'ip6gre0\x00', r3, 0x2f, 0x4, 0x6, 0x6, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xb}, 0x10, 0x700, 0x1}}) 16:37:54 executing program 1: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x400080) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x1, 0x80, 0xf285, {{0x2b, 0x4, 0x1, 0x9, 0xac, 0x64, 0x0, 0x4, 0x4, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x43}, {[@timestamp_addr={0x44, 0x4c, 0x77, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x20}, {@multicast2, 0x8}, {@multicast2, 0x3f}, {@loopback, 0x3f}, {@loopback, 0x7fff}, {@multicast1, 0x2951}, {@loopback}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x5}, {@rand_addr=0x64010102, 0xfffffff7}]}, @cipso={0x86, 0x38, 0x2, [{0x0, 0xb, "10dfb50a1c3395417d"}, {0x7, 0x4, "2fee"}, {0xcf5dd6c5d75cbfd, 0x12, "d82205b7e7508cbb300f827a248e34b9"}, {0x6, 0x11, "d44bcfbe2a16814ad96cb5ba87a572"}]}, @lsrr={0x83, 0x13, 0x49, [@rand_addr=0x64010100, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', r2, 0x29, 0x0, 0x9, 0x0, 0x40, @mcast2, @private2={0xfc, 0x2, [], 0x1}, 0x7800, 0x7800, 0x6ce5, 0x8}}) 16:37:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1c, 0x6, 0x9, 0x80000000, 0x199, 0x1, 0x6, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x100, 0x70bd28, 0x25dfdbfa, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40810}, 0x4001) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9b}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x53f}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x8004) socket$inet6_udp(0xa, 0x2, 0x0) 16:37:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0xf, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x4004090) 16:37:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3fb, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x32}, @local, 0x7800, 0x0, 0x1ff, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', r1, 0x4, 0x7, 0x8, 0x4, 0xc3, @mcast1, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x40, 0x0, 0x9}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x32481, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) 16:37:54 executing program 0: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="4fb5457a6c91fd6e8782a1fe50a96872", 0x10) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x9, 0xf3, 0x1000, 0x30, @dev={0xfe, 0x80, [], 0xf}, @mcast2, 0x1, 0x8000, 0x4, 0x3}}) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)={0x12f4, 0x12, 0x1, 0x70bd2c, 0x25dfdbff, {0x22, 0x75, 0x0, 0x70, {0x4e21, 0x4e22, [0xcb, 0x6, 0x7ff, 0x2], [0x9, 0x80000001, 0x401, 0x7f], r2, [0x7f, 0x1]}, 0x7, 0x10000}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x9d, 0x1, "d2660aea7c9e1f06e78fa350e141580c676e11afc4312190875ad88ca3e17522901cf5fd422fe68692f7cc74ca81ccacec12bdbaff351109fe12c5c718a4dec70e75cec9e1982522fe43a9da9b23cb8eeefaee2b91fcff5a6568b1a4d6b67d23e0609a3fcb7571415ee76039ed21aefedb13073f23628850154212cd0271a48f39e67e8dc3ec7714941913c5b6b91664ab3e093fcc2eb424e6"}, @INET_DIAG_REQ_BYTECODE={0x6b, 0x1, "421d0087c0aedbeb2b7645185c92e5b94bce85eeb37a5df7051666811b6b2a11a318ccbca345a4437be4aee769d135bad273c404006d4cd9081348933661676e7aa40558da320f40abb56ab2bb97fed1fbf9bc3c87cec71c875da8f73af51ffd6f195d951338e7"}, @INET_DIAG_REQ_BYTECODE={0x51, 0x1, "95a65434b91ae5579027861df9441e38641dde402a96e0c4bacfbcca3929b703788a0579ca9776691f5cc9e42ea0c8489fe428c1fed57c16150a7c1f344d93545a0ecd2c7b3a3173633b82540d"}, @INET_DIAG_REQ_BYTECODE={0xdd, 0x1, "804abba9c7a6c53985938d75fc32ce0ad3a295dac67bf6f2b9c041517a9b20f12e8dd30b9a7e6a644d401635b3ddf5a637c763b9a4e7833b72e15b5fc0783e5f865da4d5d08431886c67a896aa4db47c54a43a7ff4e7062e68685c3443fb39c672bbba8fb9d65a64dd4e9c25f69ba7ccd98006872c0f6df6d1256ff5fc8af9a7ce328a2aba622171032a92118fe8d8fda47e6aed37ad7d48b954468bc3780b8e6da23cb613233e03cfd4f71c327f0e6549b40ec9389a52bdffecaa01b55aea77f582e9a014e4e20047862dda384f68257bd09028a6f73e439c"}, @INET_DIAG_REQ_BYTECODE={0x62, 0x1, "d96977c3537e4d52de42707722ce632f2f51c970c1d7b211251136966fba01bfa89f938525ad12834169e3b1d114cb9c0840ef5b6b6ef8c756c1df6c1a19dda8f09aef98921df5617c84b08db51bfb67ccdd404b8d0acf9073635f05dd4d"}]}, 0x12f4}}, 0x24008002) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000100)="1304c4d57ae316640ba91e6ab8714f20", 0x10) 16:37:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xdcf}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xbf}]}, 0x48}, 0x1, 0x0, 0x0, 0x501a61bc9bf44563}, 0x4000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8907, 0x0) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 16:37:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x7, 0x1, 0x6, 0xffffffff, {{0x26, 0x4, 0x1, 0x8, 0x98, 0x66, 0x0, 0x20, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, @dev={0xac, 0x14, 0x14, 0x10}, {[@generic={0x82, 0x2}, @generic={0x44, 0x12, "62b5a003bdf91113d942c4973c980b7e"}, @generic={0x81f2483e258506d6, 0xd, "d40158ccf32bed202bc0f7"}, @cipso={0x86, 0x3f, 0xffffffffffffffff, [{0x6, 0x10, "953bc04f17c4a5163f28cb8175e2"}, {0x5, 0xf, "99738eb61f60141e7df5d02aa5"}, {0x7, 0x4, "9eed"}, {0x6, 0xf, "19450c2d66977f6afefb385f59"}, {0x5, 0x7, "e7dedb1c30"}]}, @end, @lsrr={0x83, 0x23, 0xcb, [@multicast2, @multicast1, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @loopback, @multicast2]}]}}}}}) 16:37:54 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 16:37:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = socket(0x1e, 0x2, 0x6) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x1a0, 0x1, 0x9, 0x201, 0x0, 0x0, {0x7}, [@NFCTH_TUPLE={0x9c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2c}}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x30}}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @NFCTH_TUPLE={0x2c, 0x2, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_TUPLE={0x80, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @loopback}}}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xc}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, 0x1a0}, 0x1, 0x0, 0x0, 0xc0}, 0xc0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9e0}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x800) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:37:54 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x400182, 0x0) rt_sigaction(0x1c, &(0x7f0000000140)={&(0x7f0000000000)="8fa978c6624debc4c4c3c57fcc00c423dd0f3600c4622d3b95d87ffef32641d3abfeefffffc4814012c667f2a78fc978cb03660f6e7000", 0x8000000, &(0x7f0000000100)="c44159ec9e06000000c481d45e4f7b6741dfe044c184ba00000000da8fe978800fd7c421fd608b03088041c4210d7db094000000c443055e100b450fadee", {[0x9e0]}}, &(0x7f0000000200)={&(0x7f0000000180)="f30fbd38c481215eb20000802064640f01d7c4e37d39c3810f76e4364498c403290ec41ac44321789b010000000166470f5ee8f20fc259fd81", 0x0, &(0x7f00000001c0)="c401cdf613410f5bfb430f124142660f38375e0dc005f4ffffff880fc169c6c4c2b2f54659f345fe8476a2000000c4c19812df450f83e70127e7"}, 0x8, &(0x7f0000000240)) rt_sigaction(0xe, &(0x7f0000000340)={&(0x7f0000000280)="3e676426650ffbf3fff23e0fae820010000241dcfac4c28d3afbc4027d333fc4417d518da52a0000c4c3fbf0e500f20f0f4a05a6400f6640af", 0x40000001, &(0x7f00000002c0)="66dab8d48d0000ad65410f746d5a662edd9100000000660ff7fe460f5ea7000060ff0f698d434c00006466400f3a22800000000011c4c1e055057a5e41c8c463456b53c6fd", {[0xffffffffffffffc0]}}, &(0x7f0000000480)={&(0x7f0000000380)="c443d97dd605c4417e5b1d07000000c4027d1ec0c4a2f9dbe4660fde6f00663e2e262666470f71d54d2e66410f38045c6343660f38dc41eac4c1fde64b3ac4839d7dedcc", 0x0, &(0x7f0000000400)="366566410f38dc8e3b000000c4227d30cb2636362666400f38142e46e1a8653643d28d7d000000438dab0b000000c46135eae6c02d1c120000aec4e14574980010c0fe663ed9ed"}, 0x8, &(0x7f00000004c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xe, &(0x7f0000000080), 0x4) socketpair(0x29, 0x2, 0x1000, &(0x7f0000000040)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0xa4001) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000017c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @timestamp, @mss={0x2, 0x6}, @mss={0x2, 0x8000}, @sack_perm, @window={0x3, 0xb8, 0x89}, @timestamp, @timestamp, @sack_perm, @window={0x3, 0x5}], 0xa) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:37:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x601, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000308010800000000000000000300000906000240890d00000900010073797a3000000000060002404305000034000480080008400000000208000640fffffffb08000140000000090800064000000008080001400000000c080002400000f2d50900010073797a31000000001faf673b0f70ea433b416493a30625831530fdb86686f2"], 0x70}, 0x1, 0x0, 0x0, 0x4040000}, 0x44041) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000000)) 16:37:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x402, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000380)) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000340)={'erspan0\x00', &(0x7f0000000300)={'erspan0\x00', r2, 0x8000, 0x1, 0x3ff, 0x9, {{0x6, 0x4, 0x0, 0x30, 0x18, 0x68, 0x0, 0x8, 0x29, 0x0, @remote, @rand_addr=0x64010101, {[@noop]}}}}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x4004000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x44}}, 0x24040080) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) bind$isdn(0xffffffffffffffff, &(0x7f0000000000)={0x22, 0x3, 0xf7, 0x75, 0x85}, 0x6) 16:37:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001080)={r1, &(0x7f0000000000)="2020b6ec22ed939d5cb78cb95fe315e0573d62d705f42a1112895e49e1ec3a221b28c5e2d98a248f648cba83d8339f9bfcbe4d4cdae881016f4168ec5127db5f8e4f4bd546d7e631651c134c8f817fd23c6320f8fbe6aa4d2b4abb3bd8937e95417eb53e770ac75cf5285a64109fd0cb0887b7c26a2b", &(0x7f0000000080)=@buf="61459786c45460c0677dc4f0b4d39dfdc8d26acc1caa32273b70012028667f48d9057da4fd680285ba51adcec15713eead9eb5ba3027fafc2cfa8952cd0dfb1c49072a05460f82d0e107b3ae608cae0bcda548731d0fa7fcd4ddc0898417d3597590d94b1467e017011ba4526452414ff99a68cbad5ccdef6d560f0b658ccaf1fde888f1ddd6086871c7c0e1341744b455ffd02e76d986af2e53ebe2d9f6613db67ee905f9777e06bf823615e08947fe97a68a4bb23d2edcc67359c1a626f76a75276010092ee73e7c58dc7edf2149951a890eea9f6255119abd7e40566d2264d36e6ad1a235c85682361e15c75fa224400c6be625e01dbb1f8f69a8c6fcb0410dea0a3f356775dcb1a39d79f41b22b313bae9ff1d7703f0d2810e38da1455a2b2e6fb71d4967f36951252f4b82125f6f4b0cc45873716b9bfa5d0e59d920f5a17bdaa733b3ae9ad2699600dc15393f11ffdc8aacdedbad11f14f56c63bc65cef1e73f9b45bff4d3c495ef9a39ebbc8bce561ac44f49b000c81d988cfbf75234ae7f56cf45ce98964d0d5513698625d6cffb1af198fb8feae182c269f21bed4bdbc58c345ff1c64d0b1f562d9fe28b8c42e65885c68cb3624484b25d8bc01f659c26cb38d8ae9e36e9e386d84a19271afddf339959723ccf3cf76e8c60d841f467d2ba2b60bf830cfebcab12deb224ae1d325280b2f9732b2e882b4826d9e9006d21f9a5094009e39df9198e382a896bc4e51daada3225c3288b8c1f7b645d8b9f64e2c45eacc74fc61958f4693f3168ee41687a4310fa9f2e91f9fc42e46be131cd444bdac9b6ccf736b0984293bb69be285c7a3e44c1a16f90c428f3f8c8f537b6848dff2eae214fe305aa3f00ba2ea15bb45b4577e62f44c5b61700b93395904cfb182c52cf6a5176ec59e30fe600d3643986f640cbc491d660222164a36eddfa0161011acc71f1953122f6a026baf12339a94407ed9a2acca8da44733b001c1c316ceda7a3b47de8d716afcd1018ff04f17995a59e0b8df9efeb64140b240286d0116f61dbad96fcd9a2a3a58d97f337013005e76eb25fe99e84083ff0db2d07384cf7300032ad659e0bd16ed780a7f86dabe3371dd056f6bbbfb43095fe9224f627d9c271a11c05096c41c4fa7815ad4f8127b4be610d4459af618ba404d758120ab00b677dd54ca6c05ce409abee9cb46a2cf784d55b61df7695f2d4c853c96891e2b42073450d0ab84416abdbaf20b6a204021f80a35d1bdfbf95a36c149ccc88f2c4ad7b4297ba6e3926b028465d91834f430b8f10225c8aecf269fdbd7dd774c0e0edf15df1e32175b455c26ca6a4cf4fbbeceb86e60194df5b6f18a231bf7f6939dbb2301a67e2c601fe095737e180b59da76cd21675d30e0101bf9756d436482d3beb18e20d58728aeada201d78680dff4bbc305866ccbd91f1685c806b6122cb347ad1b6173e6693cc32c1858cffd8ab9344b760c229cbf1d474a67331455a816d06b4ddcf05d9dc4a93dec6be4f991591ad998a916a4583b9614bcfd9b040abc0bc1eb8563761863ac1372ad8c504243696050095cd9946e576cde742bdaa35db22cf74f018a11e5e99ad717442c4077749ffd22c851da2a14b4092e5154ecc52e599fc52851ff1fe91ae7c170f99ed64dc0d3b94fc53a407e1f58ba86b4c060f03c6c0bb9e1da75c282619f816b882815c82221ad7193eaa8c79f133a4fdfddc3bcf8b914195998a1173578d05f64f681f77e631679cf9978f5552500dd38507f9e2bf7059e2f401d424d1dccb7613f2ccc179052fbd15f9c8d4227f7983d9713d51617b5c6de44be38c9629b06810665f477a915cb1a294e94ff3f179a67c5f102d8e7772f6dc09d47898ecc6eaf88cfb00a3c93419e4014d19afd72db175c227a9722c3510d21aad984d00de97af5d20a6bc3d5e77516167c96f76d0f60456e4fba30b673b70c78d6f3a9325f5c70531198a34a548371cf1bea4984d0535a9934e093e6e4a171ab7f98f130dc90c2d5f29f2abb310c3f5d5eac186c81b006a3928b3fcf1e15c50f57ea9f5d463d0dc6a65a5375091f26faff28eabdacad9f6c6698ddb5eedc5195aad2f9338a71d7e7f99eb6b51d638069eae40e080caa4cbabb732556a8e4c22ddece7d5a051de14181c3e495c4c4bf2be52fc459dab640550bea59a7be413d8666e79f2cf346fc5f72353f65ab8dcfcee144c1592e943c29679ae5c575db0acec213074a7164ee83227a3618573f89ba02a4dce34f426e4a5dd0efc3bbe04bf216b9118e52dfd32f3800f3fe9c6013b772d04ae22aacb2a2fd6bdfaa3f2448422ec556e4f7c89490d44bdcdd7580fe56d00a080eda763ceb90ee88f0d8193cafbb77cf4326296e2421de07384f104786686d33f54b989c94b18802a0c394b852d00c3868aec52967039be809537c6d31eddc167a00a3ef3abdf55bed86fef8c1d2166d16fe24123f5989612f8018f105aec9244e104f902187ceb708b42d4cab41bc650796d2e80d8e74b2ea90f952e1869955221a661e1dad9d8dc6704a87418d74b12fe202dc08872d97cb3b98e9f5157a21defcd11ab9483b5948cf442ee7046a1510ce252633a7cab16f951f43f023e713e472c1e48caf297fc437a75ccbf7107184547e7f3a51ee33db951b8cc9344ea0a9bbe9e3a8454fc6cacce12e4c80d57b41733102b71a96719ac46872dd415decf15cbdc99779cbb2fc4b361e45e06ec676be6335ecf5dd81ca8f182e1e3aa8faaa5a724be8cb5491584560bb110b387b1d70316a96f0855dea25e9ab24e9c77947c8f433692134525bc06fe54435970e75c6710700c3513fa070f8ce04ac1b9b3d6a48bd572fed7045c0f1c460aeaffa00eee32592c0b279f814e38aab475a28e6c79d867a98ce33c1005608aadc25f6ab6f282cb478010296d5a745866a78325ddd816f42a154d386a78d3e84d81eadac50d4b91447fee066bc5fae19db026211cb1adfd1a6cd115a44573d22ce914119025413765083bf4488f6c331fbbb7a4c4a94c37b24bb85e21cc2a1e3b0d36b93e0a83955ed74b562589ca01f91422ea9d5bf5a6a42006be775df2734e058a85e664b30ec11afd41a3bc4e020eabd4215c92cad93cdd5913dbadb0a44c74c274d7a3d9183e9cf433db859282df1561aa5ba32e46802c03f9d1e6e2bd9fa40bc61005d9517a4fe11c7dcceb6c54e4d95e8ebf36ca7ff5c4217b9bda8798c7b5ec156c87cef252725bf5618782cddd29535997b77e71ac3534d8cdd465ab77fb2d7bbe1048a1680c7974d7d97e676e29ff74f5e62daa9c3ee8985de69279cc78f2081ffc0c8dc1284639f9892dd4e0c6ccdfbe10630d30f079483f90aefd63019f8f4a3186e5669b7a253a748b3cc13c36b7f1071b103de5a3f8f004850b6acdb6c5f16ad4aa8bc86c18af6c7b75dd2b268750b61818146bd84a68773a479a662fccefbe30234f37ff106b9cf4b2bf43d1b205ac7e00581740bb18890d7416c41a68438570f71f1b1365937a44e8377f5e3376de5d6c3b08a101ee6a5a9037c979dd6ccea0efe746b03f5913b7d37e732191ec9f51ed367fa5cfdfb04972414b4444c21e062757126d12fe7cbd3228715b933a2a13833c68f6b201129835548f015770412687c68bd79273802202220b77bdbef4a25ce68dc87f722b1cd7d85686678565f262be9745f8243d315432804e9794f46e0a64c68455553f9317d380d4ba12173c6f34cf72c881ea4423a0f26d1968b2db12c9a2ab8085c5214d9b2cf22939bc4f9c206652fd6d486a2c8e90ab8edbe695eaf8c432e4eb98bafd60b7f033d2e1fa98071bd69d444a14eb6dbc82e07aedd99cf565dc45833ec9dec6d1d4f7f43c11873c4c5fd0284ca8c92cbb88c4b57a38bbb07e3ce08fb2b5521ff1be69b70b3d35b8922e2accef636fb32167d4d31373c0f5a6bd0d32cc62bc5d045a8545fa606cea7823621ee2bff54763a7d60f9b5ae3816bed1ac3a2c932f49c49ff6d5269b07870447c4584f2ad97feeba485b6c2538abf5cbd75301fc70de81b7c970f6ff23e030b956bdf8001b036e4469e4fe5e827df13e1d2abd6f90a1e96bb1e62e7c17dc0bbe6ddd80d714127d96c719089e9a468a83f9ce695bc1ecd6e2b2ab153431f4216825a032d90779aa1e80f6767ebdb09feafe4ffc237a58198ca8ae77356123efd2b6e196c9ac32c97af4336ee2a888063162df34778ed0c4ccd1200d33f38708a16b90f7a8b1afc88c5ff104d4f6cdf4550d4ad571297e2807a2f8a24c4831c96ec4d0b28927d46780e1fcf2451a190dd96a20736fed5e2ee57920336c3f8f4b629a9267f22ff2fb75f31c4fbb8832b343beb2c56d5b962cbeb5c7f9379ff95d08195088b00b253d0bfdecbbfa5b9197232e79f14297710dc577225a5aa9a3affb5d12c049e3b2e7a081be8fda672e4d3eb45b451c24cf47ba664a4773cfa94f2115d90ddfe6a66b2d0e632e624297473bdf9750d6100427e49ae98174f747cfa1bbfbfe8b8c8968b2c20cd0e3ad1e7c289ae77da05e6fe01264e02ca2682210223ed1653f4b8f4182cbef9f2d81c9794536b0231401a98e6a9c780a622fafa49e5017216e86a5a25b57fee139ce2e3f00fdcdb5d15b70d26c2824eac6eb5bfddb2993fdae6a242715b60c4741d88b50182840709884a6e7a4bef19672c6c772e22e0b6f2a3bb58c268456c9f2c28d4393a68730546f3d426ab9c434b3705e2fb5c8794f5839042268165943b43f83b7560344a5aaaf270bc87cb1b007737e7443e214a0fc74adfe5af6ae5e59b505847318234e861a295b3bf037c54e71e9546f1cd04aa9925f4cb8a42be88f9a7e8afb6b326c2d29bb465202350e25f946df1b841eb23a560ece7030070eba20fd13a704cdf86f6a0e412223c8fbf4c3ddc7d2d682e788b3ccb449f7633eaf1059502d4cec30f5d134eb0368fa6ba7098d87d712b78737267f304583950694a8ba23ae5cb972e35b6d9865066d33132dff9664b13096bd5b059f5352aea3a8778b46fc1b25b7680673b0cfc43d41a865b85e16f9bf1a1ccb5e21dbd82dd44f0acd08e5c15272fe0b00725d56918acd79cb3ebf34ae2fe1f437c9926bbe992b7174b33d00adfa78c6510bc550b8a59be608e28c36c5cddd7f16a7edc57f06da208147de6455849e4a9393678b2a1a8de8f0781f1570257e89159f4e583fe34d71252d1321d24d963fbf1e02709d538878e786a44be3f2774266b7343ece2f59b78069fd85855159bb63c435928a51a85dc0e870c9c507dc1241aec2e0b3a35323010c8c2e2baf0c580b771a844ed70e586f7a75f64acc27ac3c61e966875cae3e40c9576e738d974b5e53db2f0519fddc785bef9a4b44ff6cb4105a61d740e031aa18314c2ee0f52d3b27f4338f410bca87ad75dd705502f748067cbf636ac371defd94c71cc31bc659b8be43e28003febf5b590ce2b109a3bd6bca5c37cb58ebb8dc3c8cea7f8b62c693f1b7467584877f4fdcc0fe5c64acfd76c1d1a7fa8e1746111acca75e528456bb66ef6be1cd91936365d9d38fb043c6ca17ce451cdd1b3c942e9645c484abcb8049029cf363aba0eaf59c713a769a5217245bc451830c303d99e8f18ea19e5e2f23f5fed5a2d82bd45c123671c607a9bebae3f0e416bdd243f0a4084b21f57d8daefaa5f2154c8770195c78c5316ba4b41b467cce618cd36ad5a86277f5d2e29e642e74bd45e51d6c4d6610ade3a609ce93d23dcf4afae02f50ad82baaefdbde644236ddc14be097cfeb433a794b", 0x2}, 0x20) 16:37:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$isdn(0xffffffffffffffff, &(0x7f0000000000)={0x22, 0x5, 0x8, 0x3, 0x3}, 0x6) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:54 executing program 5: bind$802154_raw(0xffffffffffffffff, &(0x7f0000000080)={0x24, @long={0x3, 0xffff, {0x100}}}, 0x14) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x23de02) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) 16:37:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @remote}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x8001}, 0x90) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 16:37:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) socketpair(0x18, 0x800, 0x19, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{0x303}, "51e849938cc32b07", "c1262379f5ae958822d8d6d13a7ca80f", "05aeefd0", "b02786652e85dbd3"}, 0x28) r2 = socket(0x2a, 0x5, 0x2) bind$isdn(r2, &(0x7f0000000200)={0x22, 0x6, 0x8, 0x5, 0x1}, 0x6) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0\x00'}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}]}, 0x58}}, 0x88d3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0x1, &(0x7f0000000240)="ffb86fe4e68092fd78f678dad19891bae09636463ad2b5084ba6a999785d40c3157088333a2df8ef1ebaa09ab5497af455e229fb7ddce72d2519f24355f27033610a957079e02e91a2d117786ad50b8583c88288bbe2ccc07f0a690aabb2d18449d620306153362024a840f5fc404f160e7544a7e4b7b7cf9ec0d7695e3e203df84aba4444432762cbffd5a3bb5490dbd240905011dea36b419ae561167c", &(0x7f0000000300)=@buf="ba92682b3fc20b83343d06aaf8acdf66cf0a6bbc9e2058d2d85f06f77ad43e2ca967ad85ddfa442bbe42997b647519dc33ff65e4187a8ce47cbd54446728b968d8102a5b7c0fd4d75bc09ae1605ed85bda15a9ec80fa35e0a807cf1e39c6b06d28cb946f770116a301e4f833e275042d3e4bb89672c7027c5eceac7d36fdfc7aa0996f731eefb71550512cc4e20cdcc27dea7545c28919893e3f584216dd70e0a97fda3c57a2b4739fdf220f2bdfd36f84f7e8f7b044951b91023fafd178755f4ce6470511984fe24c69ad36cc3ed0106fd244ffa41f0df5"}, 0x20) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1f, 0x1, 0x0, @loopback, @mcast2, 0x40, 0x1, 0x9, 0x2}}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 16:37:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x24001, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@dellinkprop={0x114, 0x6d, 0x200, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x2000, 0x4}, [@IFLA_CARRIER_CHANGES={0x8, 0x23, 0xffff}, @IFLA_XDP={0x3c, 0x2b, 0x0, 0x1, [@IFLA_XDP_EXPECTED_FD={0x8, 0x8, r0}, @IFLA_XDP_EXPECTED_FD={0x8}, @IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_FD={0x8, 0x1, r1}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r2}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_EXPECTED_FD={0x8}]}, @IFLA_PORT_SELF={0x2c, 0x19, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x9}, @IFLA_PORT_PROFILE={0x6, 0x2, '\xf7\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x7f}, @IFLA_PORT_VF={0x8, 0x1, 0x1}, @IFLA_PORT_REQUEST={0x5}]}, @IFLA_PORT_SELF={0x58, 0x19, 0x0, 0x1, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x9}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c8fd3131a7ff012745ab3e5db088c129"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x78}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "8b4b680f412a64e30316bef58210fca7"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "55ee518cbb7c65291cbf36d15ed2adb5"}]}, @IFLA_PORT_SELF={0x2c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "5f7d143f08fe55f591cc42a222ef6fc0"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d6caf0e908ea499fdebeb7417df04987"}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40040}, 0x2400c0c0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8916, 0x0) 16:37:54 executing program 5: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 16:37:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x7, 0x700, 0x4, 0x5, {{0x23, 0x4, 0x0, 0x38, 0x8c, 0x68, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@ra={0x94, 0x4, 0x1}, @rr={0x7, 0x17, 0x24, [@loopback, @remote, @local, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0xf, 0x6b, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x15}]}, @lsrr={0x83, 0x1b, 0x1f, [@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast2, @multicast1, @remote]}, @generic={0x7, 0xe, "62c5214e4e354fb37e691aa5"}, @generic={0x89, 0x5, "abe226"}, @timestamp_addr={0x44, 0x1c, 0x6b, 0x1, 0x9, [{@loopback, 0x51a}, {@rand_addr=0x64010100, 0x3}, {@local, 0x4}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'sit0\x00', r1, 0x2f, 0x2, 0x1, 0x8, 0x50, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000, 0x7, 0x8, 0x9}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) r5 = socket(0x1, 0x4, 0x9) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000100}, 0x40) 16:37:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000540)={'ip6tnl0\x00', &(0x7f00000004c0)={'ip6gre0\x00', 0x0, 0x29, 0x2, 0x0, 0x2, 0x20, @private0, @local, 0x20, 0x7800, 0x7, 0x7ff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'ip6tnl0\x00', r2, 0x2f, 0x0, 0x0, 0x800, 0x1, @empty, @private0, 0x7, 0x10, 0x4, 0x800}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="36d3303f140f7d845981a4f9b1b0505ff5f8eec9eb926a07b115979970bd992d4354063c", &(0x7f0000000080)=@buf="188b7704d4024bc0508427b5839b7df7780e8d2301a737a4de9e710fd6490574749210c6ddf94e835881b8e6259fe558f22da97d5e1d2adabdd1655d92f096071cd8e2967c0cee5713c8bf5ff11cc5b65d3f383cfbb3b12a06a7bea4edab523a53c62f87a9449b2da51e37e1b69a1ba45f13da1cf3852609b002b79c9efd7f781c25c925ac593a0aaa88d1ea70398f277a8ae1ae54f0c9d11727e9d630662b75946a9de89188ca3e597d83f7a147df8b6abfcefb7d30379e6a50b91c5da2c421dd6474c4c943d308500e78541cc3c6893316045f7be0068a3a0406", 0x4}, 0x20) r3 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x400000) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000200)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 16:37:55 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@RTM_NEWMDB={0xb8, 0x54, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x3, {@ip4=@loopback, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x2, {@ip4=@dev={0xac, 0x14, 0x14, 0x2e}}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x0, {@ip4=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x4, {@ip4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x3, 0x4, {@ip4=@empty, 0x800}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20002801}, 0x8840) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:37:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000040)) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x4, 0x6, 0xf7, 0x2, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, 0x7, 0x10, 0xffff, 0x400}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) recvfrom$llc(r5, &(0x7f00000002c0)=""/55, 0x37, 0x22, &(0x7f0000000300)={0x1a, 0x310, 0x5, 0x46, 0x1f, 0x1, @broadcast}, 0x10) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000001c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="65727370616e3000000000000000000098442270c5cac55dbc6e6a211fbe0666bf7a54b5203bed5abf2daccd187d223f906eaad8fa995ee49a11f44e21a932e478526b8aa6104be0b6a368b86141e910163405847b7f0ddc56f51afd1fe9c7e882fbe762cae3b4ca8057ae930c7061ceaa206492894f5e3812a18b6a868bb1c211cfcf26212fe96dffebdb0e0c4cda", @ANYRES32=0x0, @ANYBLOB="780000200000000400000008470d009c0064000003299078ac1414bbac1e01018612ffffffff0502000a375eb1de9151978b440041f000000002fffffffe000000ca064410a4700000000601017f00000164010100e00000017f000001ffffffffe0000101ac1414aa4414b403ac1414aa00000001ac59491414bb00000019890be8ffffffff64010102440c0913ffffffff000000020000001d7c02421328a17b087eef646e65a4887dfd61b87e69ba9dc39151b1b7c36a425784abf32ff6f3a4313773cdf1a9d54d3d9c4bfbc04852227cbf083c000085dcca5dbe048c275bf1fdf03209609fe98f8b14"]}) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x8c00, 0x0) ioctl$vim2m_VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000040)={0xfffc, 0x1, 0x4, 0x400, 0x10000, {r2, r3/1000+60000}, {0x3, 0x8, 0x7, 0x4, 0x5, 0x80, "01d45eff"}, 0x0, 0x3, @fd=r8, 0x4}) 16:37:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=""/154, &(0x7f00000000c0)=0x9a) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xc1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000000)={0x3, 0x200, 0x1, 0x2, 0x0, 0x7ff}) 16:37:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) read$FUSE(r0, &(0x7f00000002c0)={0x2020}, 0x2020) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r0, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3fb, 0x800, 0x70bd26, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44000}, 0x20040001) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x8000, 0x720, 0x800, 0x101, {{0xe, 0x4, 0x0, 0x4, 0x38, 0x68, 0x0, 0x20, 0x2f, 0x0, @loopback, @multicast1, {[@timestamp={0x44, 0x8, 0xc1, 0x0, 0x0, [0x3]}, @end, @timestamp={0x44, 0x14, 0xda, 0x0, 0x8, [0x7, 0x2, 0x2, 0x6]}, @generic={0x44, 0x6, "e9872f51"}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r1, 0x4, 0xff, 0x6, 0x4, 0x0, @private2, @mcast1, 0x0, 0x7800, 0xfffffffb, 0x9}}) 16:37:55 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000180)=[@mss={0x2, 0x7fff}, @window={0x3, 0x5350, 0x20}, @timestamp, @timestamp], 0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x4, 0x9, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @loopback}, 0x80, 0x7800, 0x4, 0x8b47}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r1, 0x4, 0x8, 0x8, 0x1, 0x12, @mcast2, @loopback, 0x40, 0x8000, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x2, 0x9, 0x77, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, 0x7, 0x7, 0x9, 0x7fff}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)=0x9) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000180)=0x7fff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000140)) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7033}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008810}, 0x4008000) 16:37:55 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x1d1040) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)=""/65, &(0x7f00000000c0)=0x41) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/35, &(0x7f0000000040)=0x23) 16:37:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000500)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x5, 0x2, 0x3, @private1, @private0={0xfc, 0x0, [], 0x1}, 0x7800, 0x7800, 0x1000}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x1, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) recvmsg$can_raw(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/87, 0x57}, {&(0x7f00000003c0)=""/224, 0xe0}], 0x2, &(0x7f0000000280)=""/205, 0xcd}, 0x40010021) 16:37:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000001200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001440)=[{&(0x7f0000001280)=""/223, 0xdf}, {&(0x7f0000001380)=""/107, 0x6b}, {&(0x7f0000001400)=""/34, 0x22}], 0x3, &(0x7f0000001480)=""/226, 0xe2}, 0x2) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001640)={'ip6tnl0\x00', &(0x7f00000015c0)={'sit0\x00', r1, 0x4, 0x2, 0x3, 0x4, 0x4, @private0, @local, 0x7, 0x8, 0x4, 0x10001}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0xab, 0x0, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, 0x8, 0x8000, 0x0, 0x3}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000040)) 16:37:55 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'gretap0\x00', 0x0}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, &(0x7f0000000000)={0x3, 0x3, 0xb09, 0x9, 0x4, 0x6}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:37:55 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:55 executing program 5: openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x18280) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x2, 0x2, 0x4, 0x4, 0x10001, {0x0, 0xea60}, {0x4, 0x0, 0x7f, 0xff, 0x3, 0x9, "e610117c"}, 0x13b3, 0x2, @planes=&(0x7f0000000000)={0x2, 0xfffff801, @fd}, 0x7, 0x0, r0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:37:55 executing program 0: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0xc20, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1f}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4002000) 16:37:55 executing program 5: getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x3, 0xffffffff, 0x47, @private0={0xfc, 0x0, [], 0x1}, @mcast1, 0x40, 0x7800, 0x7, 0xd76d}}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', r1, 0x2f, 0x3, 0xff, 0xa1f, 0x22, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}, @remote, 0x17bf22cb390cd85c, 0x8, 0x1, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r1, 0x29, 0x6, 0xcf, 0x380, 0x10, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x20, 0x4, 0x2}}) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052140)={0x26ac, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "791f3e18e78a70"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053140)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "41db063e2e1845"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000054140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000054340)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "4f0c02bd01463e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055340)={0xf3c, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "9db333e8e08742"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000056340)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000056540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000056740)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "ef516603b5ebbb"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000057740)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000057940)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "fdfa590feb3294"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000058940)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058b40)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3, "e9fd063fa753ce"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059d40)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "432735d8ed8b43"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005ad40)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005af40)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xff, "4156e3afface63"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005bf40)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {r2}, {0x0, r3}, {r4}, {}, {r5, r6}, {}, {0x0, r7}, {r8}, {}, {r9}, {0x0, r10}, {}, {r11}, {}, {}, {r12}, {r13, r14}, {r15}, {}, {}, {}, {0x0, r16}], 0xff, "e164a5c3b7c776"}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0xf9, 0x5, 0x2bd, 0x3d, @local, @private0={0xfc, 0x0, [], 0x1}, 0x700, 0x80, 0x6, 0x20}}) 16:37:56 executing program 0: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x8916, 0x0) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x4, 0x4, 0x2, 0x2, 0x38, @mcast1, @private2={0xfc, 0x2, [], 0x1}, 0x700, 0x20, 0x3, 0x4}}) 16:37:56 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x3, 0x8, 0x606, 0x0, 0x0, {0x0, 0x0, 0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000018}, 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8906, 0x0) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000140)=""/10) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="29b964a1fd485d530125db7f45c60b28", 0x10) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000000)=0x7ff) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000180)="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", &(0x7f00000003c0)=@buf="cd69353f182a1cca4c3a278027806b229b500586f260f7a2b361314d722261acae35c4a5e6c1c4f48101ca63d8142d05a826c777897ce33f0dd0bf96245e7a36d2bcda29a8c6da6e771d819b46ffe9d60e6f612f179a7425fc4d434733a93002dc2a0c7773a032f5f52e199e7dacf4db2455076ca4285cff4bef090ddeb1f0b86a0f6c97aa081bf4485d3fbedb10ca34fa28f441279a38b95eabe41ee25bd0ff9cc000922f3abe8bf7f48a5c8fd938976466ed92c50cf86f9bab62d2854b79aacd038d1dc1d559d059985aa7989df32303154722dedd339a7e5e7ed7c6fe5b9efa4509229d75fcf2c6f4ef72b559a8657551e2ca", 0x3}, 0x20) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)={'erspan0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x40, 0x7800, 0x9, 0x40, {{0x12, 0x4, 0x1, 0x24, 0x48, 0x64, 0x0, 0x5, 0x4, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0x7, 0xfe, [@broadcast]}, @ssrr={0x89, 0x1f, 0x9d, [@dev={0xac, 0x14, 0x14, 0x40}, @local, @empty, @remote, @empty, @multicast1, @multicast1]}, @lsrr={0x83, 0x7, 0x5b, [@local]}, @ra={0x94, 0x4}, @end]}}}}}) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x420, 0x13, 0x200, 0x70bd2b, 0x25dfdbfc, {0x1, 0x8, 0x3f, 0x5, {0x4e24, 0x4e24, [0x3, 0xf6a, 0x800, 0xffffff80], [0xfffffff8, 0x800, 0x1000, 0x1], r1, [0x1ff, 0x4]}, 0x2, 0x9ac9}, [@INET_DIAG_REQ_BYTECODE={0x79, 0x1, "f10c0259aec046a53b600ba65b842c1bbd9db65adc07db4f9f8a512f7a9b50b70fe68bf2c7c03a1fda9eddd84f510172b2e988f488c5adffb793ce126de8e08db63fd0a5c4e31f2841ffb05b0313f064d427ba7dfdbac25433d561cd47e7168090fe03650278cb127bc371450a6469cea561b5f43b"}, @INET_DIAG_REQ_BYTECODE={0xa7, 0x1, "f47f5195f7a3f18787bb4e34dc42557068de3f8127eda2da51cd122360ca199d9a3acc7f52f8d9ae2d3b26f21b26a35574f8188803308c9bf36cc4f55da273882e970def725652a33f95ca33e45cf6cc8a4ba110ce5d6cb9447b7a12807edda32c2345ee45db1fc88c3caf4fa91a34145f4d2783f4f49adee3c20796e9c6bdab79aeae868d4ca3bea37b9680d16c8f7c99bbd0fb0d6e0506c1acc0cd568b5887d32302"}, @INET_DIAG_REQ_BYTECODE={0x100, 0x1, "e1d8610c59710784781f96b218df460210f45220c9d1a13850897ac4de00db9ea4e13d416dfbe5876f59e6aa4244d795468a826a90bb0da95e79ac924a2d874a18f4ec854550400d93ac4c2504f85adb7017311b15fecafdb019feefec438d7e5e3350184d2170f469ec6bf74dd58079d14e20e2e22c2d169abea328e00f1475508c4f27d0a71a37b480523653bbfc1aad7d33518869e35c0ca354660edcca272df06032d4853112209a3fb6ba418d423d8902f895afce2cd7ef279c004347bfd4ee2525cac1ea39a20569e431da151e46fe2ecc99f9d94d137cde1d3d5a6301565ec1d2eb7243e8a61e56c9bed29f4e8fdaf38ffc2c9ae4927ec7fd"}, @INET_DIAG_REQ_BYTECODE={0x31, 0x1, "9439727a9c102f8974ca07e2d54530c173622ae9a31ec9fd0ce83a16af0aaa9d361c7b7bfc84a387da5161e277"}, @INET_DIAG_REQ_BYTECODE={0xbc, 0x1, "5bdf45b498ced7b7449d85568d2fbdcb9c62692e8b94692f01886352f4438b0f977fbba9e3635c0c90eb229caa370cb9f2d61a4eb18bb0d9753715440b3208ac1c33dddd497a21371d7a445df17762e19388302a8a2377509a8c122f12e182fd3275621fca00e3355720ff92798fae14f9afeec17571f9c7c3d106ae80323f0a787ab063b691e3a841c949917265454d0617ac6b5917143fda9515d2f84ff03f675c2405225862bedf07504539195470ee6ed1669b800faa"}, @INET_DIAG_REQ_BYTECODE={0xbf, 0x1, "644674a0daf69691ac1c61113419c2bf5086c9b6e686a24d246917d264eb16ad121616a7c0561dcf4fe9cf6e11f47f6b8d973f48f1464df1018318f971124086fcd927f4ab332a1526f51f85f21954aa1ce734f49b15afa63cddbd064a4524e3bb16536f856b4bb47b690ffd693cb4009dfd171bf7da3f967c3b5293fb17efca01dd5b2b27a3c9766ab0b513dcf7814d9f0391a3a236c4f4bc660eb3c1cfdf5b071eef3ce7aad61c6ea5d8e4a5061c9726d33e40080e6bf005db8f"}]}, 0x420}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_buf(r3, 0x6, 0x21, &(0x7f00000001c0)=""/20, &(0x7f0000000200)=0x14) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00200200010000000a0000"], 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x20000004) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x0, 0x800, 0x2, @mcast1, @local, 0x1, 0x1, 0x3, 0x9}}) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="38000000fa5d7d1b462b1a7f774d5100404e53840cd80c990ab60cf9008990eda0fa3ddaa772d5e6fcb361e3de872aaf59d3167761eb54", @ANYRES16=r3, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r3, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x8004) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x40840}, 0x1) 16:37:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @private2, @dev}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8903, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005b6c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005b8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005bac0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005bcc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000005bec0)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "70257b6e486403"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005cec0)={0x846b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "e290ee13d0c2f7"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000005dec0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "9cf3c7868815dc"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f000005eec0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005f0c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f4c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000005f6c0)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x8c, "1a66d7dad79a0b"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000606c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000608c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060ac0)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {0x0, r4}, {}, {}, {r5}, {0x0, r6}, {r9, r13}, {0x0, r14}, {r15}, {}, {r16}, {}, {0x0, r17}, {r18}, {}, {}, {}, {}, {}, {}, {}, {r19, r20}, {r21}], 0x8, "54c295e0b58057"}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x29, 0x8a, 0xef, 0x3, 0x18, @local, @mcast2, 0x8000, 0x700, 0x9, 0xca}}) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x2, 0xa, 0xffff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="64000000030801010000000000000000070000011400048008000240000080010800024000000fff06000240809b000034000480080001400000f404080001400000000308000140000007b70800014000004000000100"/100], 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x80041) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, 0x15, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2004c0d1}, 0x4040) sched_getattr(0x0, &(0x7f0000000240)={0x38}, 0x38, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:56 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1414c2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x0, 0x5, 0xde, 0x30636db8, 0x10, @mcast2, @rand_addr=' \x01\x00', 0x700, 0x1, 0x80, 0x80000001}}) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = socket(0x1f, 0x6, 0x721fcdf3) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="540000000f06010100000000000000000a00000a0500010007000000066482000200000006000b00040000000500010007000000050001000700000006000b0003000000050001000700000006000b0000000000"], 0x54}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) 16:37:56 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x608cc2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x33}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x800, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x80000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'syztnl2\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:56 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) 16:37:56 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x6, 0x3f, 0xfc, 0x0, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, 0x80, 0x10, 0x2, 0x2}}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x111c, 0x15, 0x80, 0x70bd27, 0x25dfdbfc, {0x26, 0x6}, [@INET_DIAG_REQ_BYTECODE={0x1f, 0x1, "a084dea06facc3df7d5559c3ff62630ccf60fdd3ea58f0a5a114b8"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "815a841ba07be7dbf02af8af4f61350777b058937da7341a3574e473854d66692f81bba2f2aa0fa7178aadebc4657e9a90259a354796c8ab46d9180c96f68b2a4cd30557c653f7759b475abbd0f0b2efcdf3c771629032b47de80d60d9f4cc538b22b79c1aea2240015baefdfda3d84f210022baf997ff6ef7ac1a1af7e501437a76c1b88cff7e9a0f360a531a2032c7aea3778827ee978188895102344fadb3c8eba2d40fa2737e59e92a49d32c3a40c98091ab176bb0a1cbf2badcad76657dc01dc22a57a59204b6aebb74d5f726979fd978ef3cb0c0a1aacf73100f232f4f3b87a8efa4d07fc49195a08aaa75486cf1ec0c79b7913889b9f13e9471b80169e06f055d9d6a6c9d38496f54ea326803c0cadd42d33295f644fcf700ef7378f506f5aee99004419278c1ed76bdf3e8d0496ec7dadd28eee8f0bfd90c77ae2b2eb331ebf3e31121c0028c65188a6bcf96dbd24efe9d33717c0995e1347d34dde9a53b4fe7b3a12773f636e1e3b3d2dc514de7b897bab73635da07eb70708b151b57f02e619421d5af67d3d3730691299c0c80fb77f58266e46bd46e77c42c87e88df77c6ef2f11fb370a4eca752dbfcbf757c81e94704cce0887f241e7bf372910c055ee431969955443321bafbb17437ffe5633c8e6ed1e1b239395316e2119077ddc5c91bb4936dbea66fd6847cf85fbf9b8e8c41ae3facfb128027aad231ab19bfa1dc60efe9ebac25cebc7f010348b4f9a1797122b064a439583e67628cc1397cfc5f143ddb962e91727a8c1330cb8c1466895b986abbb6bd7d7fd8d9936dafeadd739dbca54442b3be3b6f837e8b2c861c44e388b23678d86c5227bf7450f05feeee7a840e62a601443195b23c549afdcecc8ee7bb5de7dbaa6631193c0cd3088aaa42ca5f4ec088f3afd6ef26a541f12575f75dcd1c8880df696991bc767012d7c1caecf7012bc6903f67771b55db5468defe24a59d9c7d04c69b1f2e88e12d189cd46a44cd3b367c22c1534393912ec0587b310591015f4e19a0fdf5efaec19df03c0c09e117bd8d547349aac034ef65ecb8b2351cf60fa8a326312fc14a616f9d2eb52c9896265b5454e513fa2bab6bb8471191b4de66027b33e57ec3657724f81e032767135fad2e358efa2c9bb26c380fd5de8565a2a1819ebb626c5334030a5ada5cfc51564827f520458559bb639505d6465e35804830f370ec5efb32e4baae4f26eb80e72c578490c3351bcea2c1210f7b535f9d0234a40da7424a48e65fd0d07a341ed551685a1aea857b9ae267d231b24f0d99956a5e011dd9d72ce40987191dd0a8ed9869d539279749be1175f43c6800960dfa0d744560c1902a3b1c7f26979cd37e60b89977717b7099c4d3540b9f1fd527a7edadd66f9b83bf90557a51e06c64d5d254aac999026fa9389272a2f175b586345280fb3138b7b05d57ded866a6c0e3b7fb7f23f0a53dcc4bb7a2fa95b418bb44d648c6771f008a909c4fe166d6e8ff21fe2da71d7ea8c9b4b267f0e4d9a14cb2c411471e7209607c88eda3429d2cd57925fd961b2107e1c045b89987580fd17ef3f926cb5f45fa97c485eec1f283033cc831f6b9a1579cab55dd5fb4ca24d92594b91151fdb2172db6fefca6aae4d1188e48d4d93457b0d242f73b8b30f19b552a41ed879970590e80247775f503ccd504eddc8c4a5ff370c891395095a81440bf29498917f637ac8bfa039f0f02db3e90c0b19afbbe5ef6c9033b837f777de492d2d5844484fa44079db35960a8c8d77dddd47cb08ca93588b2476d68ec433e3ce566400914476b027f69a41d3b46c69cc99c510c8c1f8f5b7b83750223c5aa521aaeabd2d256691f21e6c8d1eb94dd062a8b5a084dc0e20ccd557268353619c1fb2296cb3f46b9f0be70d1fc962ea1260dbb0753616f4d353a23bf39add4789f572d576583777feffae5321e7e6a25d2d80c21f70bb0b3dfd516a39f59867f6faeb0ba1e197b94ca5904c6c72ad2075b22b43eedaf1f503d8bdd820b4d8652b649ab402c695bba2c1d5337dc8739c24a4a8773e055d3ee13566bd6aa754cfcc975da3a887c44ad1f18b825d07cd56bc44fec7ea5e698f9ce9a7657fead040fe39e68f4e444a5bec79a7d70a154c9e53facbd5affdf66621738500266f93d32357efaad53dc71b2bca1cf17165685ad13750dfe89c725bc603fe86a3a2a36533be12a5de137c83c0e8113204980847d43ca8b291c6c9729bd2bc1069df892828add9926dec8de155c5dadc1d73d088ac38b9525067477d82b93afe58782cb8121223ef3bf04bfc62c0da1c9801d64cff8c248d29532cf2f21e990994ad9c3416e99502c22819c4c03c03cec8b9f7a84ac17cb2f63e7cd2dfbba3edd6713dc9618a34127484d2ca73de0ce7baee0c6ac504d64cc480e2aa073c5a4ab47ae052cbc7116e6b8dbed977402185d5aaeb2142ebf2e7b912427998a7ecc834aa9a26925d6a1e930bc134ff7cb40203ccfc69257b7779c4b9416e7b50225ae623daaf3272c3357cb58ede7868ead450632cf4220120b440d464d3a44f6f264c02a9644d75dff25f4c074b1b663def76c1669c614ec7b251b402e923f4a059298c7651650184ecfad16b09ec7708421af65d00f5f5e5949b387fd66c7a4cb15ae1b7b44702acb9f394ddf7a589538cd20cd49684abe734b80df931b42b083a3ec45c8b6eaa66e1aa5ec9bef5108b16184dfb6c96cfaf35879e363a81a5833a422c1b83b80cfae966ea9a0beec6c8b3a7496b503a3d4ab9489b79b61e160a00828835965037da5ca50bf8e199b58f8c32ab1d4d805c9930df2688fcc6d8ba6b8b6e02d22c2de7a4d950db9f1f38e4593ad1cb0fe8cda148e994f0d51dad54d4c6dc3227ddc02f8a406a74f4304093a02359b00f43eae9f13ac9e47013df16558bb522f98b8fa4c94c151f46d52fd1cc2e195965b94c4dba40b8db9424c2dbbdca570254c657ce16069c1fef52cbdbaa6e761ada4c20d734eaf1479c7d61773ea1bed98058e5a0cad262539ba0797bce16c34c88fba7e2854675f0a3fb9400073f857218449751b5582481ba29d55d0cc2371c30b8075d08a873c16581a120f4f5a176141a70520d12057f9c006c81a0ae12a4c7cc616f4b40be682cc519c5113bd4017d626e2c76a98487dc76f822a20258c5352274b503afd20eeaf032bf2429cedf3427255f5b58f8eb5928da97731583165d9398e0edd35623ab5ac316caca78ab3c8a1cd015ddcc6f64a32a850fc2d336f72ca41cf40b33047c309a9b481b03bc8bc66549558ef9936bc04564fbf066d675d58e776deb8e8eb7eec1e80666c83ffbc3235ad0c611fdcb10d8d4df8ab6b027d04dd192df580a8b4f8516c1ce39154d4d1f6643ea69cfbff56845d791dea2fb8189a9f19f474607eb1f9fb7c0c02789fecb9a31d14dc10c1a398386c89611e3570c59b3795b1db5beca2e8689489881324cf457ea038daddc99e34beb52a27c0a0014fd4581ebec165d1dec9255d6fbca792b52e02eb60da628a6972e006a86294992d48492c63c077f2261666ed423df89566f526980f3fb8b58c772153b75f3c65ae6f99f336cfebc04e9af3116ce5a9e7247c86d6202721376be1435c8e569c4d628a147828d8abd2b07880879972f06f0b20004149e21b016cde338514ce86f96287c07e66a347aa0e069f348f2a3cd2340beb72dade0d31b22e821c818b9646c4475c6e70b6875bdabbbbcde8de80fc821fd444c3adbd3254a2b8e4869383710910ddee9e39f1bbdc18cb4d82e8b3642e606be8e1b27bcdbcdc12a25e0d63c85eafaace1f5dee5f74ddddafae83b1522505f894a60718a649cfca412d4a21981df49219ffb1f53c894fab4e30b61badae75fa92d8c55821b34afdeded293ad0e61d8d0c2b1a1a62fd61ca018af2d7b0eeb09165ce001548bf4a8829f9c3b2c91fed323df12a52c704e68e83955e655d37cec792b33d9805ca30c43f8d33fb9d9b306308a272c3734b28215a33b43864b7fad2923f975bd6f3d605d3dac0be40aa0841eef14d0e0e4309cc26c786247baef1167611f34dbfdb6637050ec9b84aaf696d2627860f79de59b835e5235897a4a00d53b9a25fd85807ef2a40b320503d35501c08cd5672b304dd81a0ece718c9f9aa13aaa28f417be38632aadacf2942e7495767ced0fb332860115e904211d4bfce877f2dea3c572048e02cb260cb7f1a85a1489e5985c32d611e16ff4085d7c4918e19563552b6a739db064851bac7a3ea5a1089bf539ec04c768dd9e3deedfbf99ecdceb252cf86c3e836fab772e784616cc0baa3fdb054d3103d1e92f847c0250c1abac98686ba11b643355fb43290ec8553190f76cfef8d34fb35c5b1cb9d1bc3e205fc2ce62b2ec9bcc74d66ad01273652b78a82ed59c44711d3562536d1a1502eaa029a85655c838604ecd2eb47e44d46fcb39c59ce77a4eab7b0ddc7363f8e4d49be7b5b21b5468c8270ba21b818362c65750f51d88f889d30222b703d779aff23cec350e68af24f26e54aa0897711b7f14d9d471b17165de7ad04352e59233574ff8329b545e29df5d70659312d3f3e0688c4f712ee31bfadafe3ea545f494e06d1ad277b11e7b199704a96b4b32fc70b12126b82f4bcc4b9ac801a328bcb0c8b567c30b062ab83f1a1418d98c918fbbc2e272fac35716be84ddd78e0190874d861eccd7a96015b5eb6b0ecd9da25be10f753d53208416c5fe20e2a2c22c54bab3ac2c0ccdd7a5e3605acce59aa46defd67f98eb02db8bc94783c163f66f53768004acc7582bd0bc49c7612680e937b8171068114e8f1e2eb6223a1b2da988ade027dcc1e0e05d7e6544c0d2a3ee20011bd09a37c7be9fac5e727b5f44a58cd883b68e656ac6a495b71cd34b12c69e70d3212cc1d0d527874a2943bb7ff880405b028047f2025df15315d6ea35581aa45eededce2eb2a05f68c7ba76784e7e19ddee1cce63d2ee4dffdec183a706717a57885b205fcb1d399b2394341c85dd2574d8df5f2b59f9793e3ef676389f29add8789a491c2c13bc60376015b1f4945e5f88547788c6224ccb3ccf8fd8262a6cd5d24192e99ac009be48e757d68f47cf462adfa0f0e0e89bd19aab11487334e0bffd8820d426b544114f2a7c8f77815914f367f519863b3730760c177ab26afda65b19ea085c0dc9dbce3363875284d4407f8c092ca2c27429f94b38e372db19954d16d59520a3a9d981fea28ee21e7fc3ea335d24638b1482b9429dc2a9c10580a28c1aa9dbd3d9f81a79ed6025b13e9a8b87728a1935664468ddc20044584b7a10af77b230bdc8ff2f893ae31a3ca69c049ff922978ad75b1ae33bf9db04c57ad2fb95b6fda5f070a6d2a90d5708be569c96b3cf74cd8b9e353c2bb52804f1ff495a90c0812864598191ec187bf679a60b13fea735fb612cd5ca72f9a5e50ceaaef9735a94b0fd3af9e205747d168787a859f2a164b4671e67a4228ad2f008e06ce30efccd2c8363d34dd3de094bfa5873089e5b8c65cf683a18b70e0f33443b87fe3b5c3044c00517f40da7f1fff10c7332b35a2e01e924ea8bd115e33384597dd2ac8d3378b0a50cac1d65383d8ec5c159e4ad4b0403f496779946fcc1e4ff5cc54628a02cd298542d38fd2610410a2d79d4468a981d9159310ac697ddc85ef29cc5f1a837eb888e740b6b98f2487356d280580fbf231dc0023d29031b4877364c57b7b243e949d67a27e176a3887bf938665c6b836d0d43f1f57fabc7dbef735e6798e70c07b4d1f0ac243"}, @INET_DIAG_REQ_BYTECODE={0x18, 0x1, "c932e827b7a206bc7343310555783d932b157856"}, @INET_DIAG_REQ_BYTECODE={0x1a, 0x1, "7cfb2faf76d6d4648e2a0cc0c8d991bf5e77e0fd2c8a"}, @INET_DIAG_REQ_BYTECODE={0xae, 0x1, "2abb0b857f874d1cfbc1e58e6465ac26a598662f7a72462f2cc14ba7f38c606d84fdabba26d92dc800f76f18e7d1ffcd497dc33c26ec5d35e062c5e2a37c0321c3262606da279bf392ed38d75df5a4b402de4809a28ed7c5df22e0b628f25432f02f700c845e6d86751eedc63e76d58947b97fb6813c6ac14177230444463ebd4ccc85d5b7c2e47eb0bb978b41c61e4c3b7578e36b297858a3c77b0fbb988a51c62811f3782ef22ba836"}]}, 0x111c}, 0x1, 0x0, 0x0, 0x4}, 0x20001804) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9c9a}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="fbffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000fcdbdf250600000008000a0003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x24048041}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:56 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:37:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:37:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) socketpair(0x2, 0x1, 0xaff, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x1, 0x9, 0x1e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2={0xfc, 0x2, [], 0x1}, 0x7800, 0x10, 0x80000000, 0x7}}) socketpair(0x23, 0x0, 0x2, &(0x7f0000001340)) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x2f, 0x0, 0xf0, 0xfffffbff, 0x1, @empty, @private2, 0x20, 0x40, 0x1ee, 0x1000}}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x2, 0x0, 0x10000}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x4, 0xf8, 0x20, 0xfffffffa, 0x1, @private0={0xfc, 0x0, [], 0x1}, @local, 0x80, 0x20, 0xfffffffc, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x29, 0x48, 0x5, 0x9, 0xe87a5b8084a74871, @private2, @dev={0xfe, 0x80, [], 0x20}, 0x7, 0x7, 0x4, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', r2, 0x29, 0x4, 0x1, 0x10000, 0x40, @mcast2, @rand_addr=' \x01\x00', 0x40, 0x8, 0x5, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'sit0\x00', r1, 0x4, 0x3, 0x1, 0x7, 0x0, @mcast2, @mcast1, 0x10008, 0x700, 0x1, 0x7}}) 16:37:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 16:37:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400040, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x80000, 0x0) ioctl$HIDIOCSREPORT(r1, 0x400c4808, &(0x7f0000000080)={0x3, 0x100, 0x5}) 16:37:57 executing program 3: getpgrp(0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000140)=""/150, 0x96) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = socket(0x27, 0x3, 0x6) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f00000000c0)={'erspan0\x00', 0x0}) ioctl$HIDIOCGPHYS(r2, 0x80404812, &(0x7f0000000080)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_CHAIN_COUNTERS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x10) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 16:37:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000180)=""/186, 0xba}, {&(0x7f00000006c0)=""/39, 0x27}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/84, 0x54}, {&(0x7f0000000400)=""/28, 0x1c}], 0x5, &(0x7f00000004c0)=""/251, 0xfb}, 0x40002000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'ip6tnl0\x00', 0x0, 0x4, 0x2, 0x0, 0x80, 0x10, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8, 0x8, 0xffff, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x6, 0x1, 0x1, 0x3, 0x40, @private0={0xfc, 0x0, [], 0x1}, @empty, 0x20, 0x700, 0xb27, 0x2}}) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x103e41) 16:37:57 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioprio_get$uid(0x0, r0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e23, @broadcast}}, 0x0, 0x0, 0x2b, 0x0, "c047eb80958fe4839e8a8d52c0937e9cdd6c5f9b7f92b3398e71aa6ca69f53c4c32414aa0e19748c048a7b362931da4cdf0d09d127c524c58940a102c6519b6457e1f9f049733422d6d2250a051056cb"}, 0xd8) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000200)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x210000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000001c0)="2836fbf68e1be3ce6e35ea47b97ea1e2", 0x10) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000600)='l2tp\x00', r2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000640)=""/145, &(0x7f0000000700)=0x91) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8903, &(0x7f0000000280)) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f00000029c0)=ANY=[@ANYBLOB="38001e00e4dfd5efa6a9e81ed7b6ee238c1af679df1430752fd6def65ae2bf20e49e7213e302ed0a57cca273735315734bcc74c325e9b3d9d16543c8422696d90080cca1ca10dffbc476fdf493fbddcbb0be08d36d24a04117c4196c87364acecc", @ANYBLOB, @ANYBLOB="000429bd7000ffdbdf250700000014001f002001000000000000000000000000000206000e0001f0000006001b004e200000"], 0x38}, 0x1, 0x0, 0x0, 0x8000004}, 0x4000000) 16:37:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="9893b93d1dc275ffb1dc946d4882ad13859f5f30ff0524074a565fd97c5d5f012fa9a1666a0031331f1fce6e13869cf57c6f51d2b8f34f26c662e53b696737391aa36f50", &(0x7f00000000c0)=@udp, 0x4}, 0x20) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1, 0xa, 0x801, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x7, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x14}, 0x4000840) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:37:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x44cd42, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x80, 0x0, 0x1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x38920, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getmulticast={0x14, 0x3a, 0x20, 0x70bd25, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20044080}, 0x20000000) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r2, 0x800, 0x0, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_batadv\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x80}, 0x1, 0x0, 0x0, 0x44881}, 0x40004) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:57 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000040)) 16:37:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0xb, 0x6, 0x7, &(0x7f0000000000)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x29, 0xfc, 0xb4, 0xffffffff, 0x68, @dev={0xfe, 0x80, [], 0x26}, @remote, 0x80, 0x700}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:57 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:37:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs$namespace(0x0, &(0x7f0000002640)='ns/pid_for_children\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:57 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) 16:37:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40000, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1ff}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}]}, 0x40}, 0x1, 0x0, 0x0, 0x8010}, 0x4040005) socketpair(0x0, 0x4, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000240)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x1, 0x9, 0x401, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4040080}, 0x10) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x9, 0xbc, 0x8, 0x0, @rand_addr=' \x01\x00', @mcast2, 0x20, 0x7, 0x4, 0xf8c3ffa}}) 16:37:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="1934f1243adda24587a31b242b9636e06fb5f62ab2191e213471a8a8857295bf368470283c525c917536f669842a289ac8e522ac1fa21ad9b34aeb857873e75cf1", &(0x7f0000000080)=@tcp, 0x1}, 0x20) syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000740), 0x8) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000007c0)='l2tp\x00', 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x60, r2, 0x532, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'tunl0\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc70}]}, 0x60}, 0x1, 0x0, 0x0, 0x40010}, 0x40) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="020027bd7000fcdbdf250000000008001800e000000106001d000a08000006001c00020b0000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4) 16:37:58 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) socketpair(0x28, 0x4, 0x10001, &(0x7f0000000000)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:58 executing program 3: socket$isdn(0x22, 0x3, 0x1) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2f, 0x3, 0xff, 0x2aa7, 0x38, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr=' \x01\x00', 0x1, 0x40, 0x8, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socketpair(0x2, 0x6, 0x6, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8906, 0x0) 16:37:58 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x100, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x8a, 0x8, 0x7fff, 0x1, @loopback, @mcast2, 0x8000, 0x7, 0x0, 0xee}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x4100, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r2, 0x4, 0xfe, 0xff, 0x7, 0x0, @ipv4={[], [], @loopback}, @empty, 0x40, 0x80, 0x1000, 0xad}}) 16:37:58 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x33, 0x80000, 0x5) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:37:58 executing program 3: socketpair(0x2a, 0xa, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x29, 0x2, 0x40, 0xaf3, 0x22, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @multicast1}, 0x8000, 0x40, 0x80, 0x8}}) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x1558, 0x13, 0x400, 0x70bd2a, 0x25dfdbfd, {0x18, 0x5, 0x1f, 0x6, {0x4e24, 0x4e23, [0x7, 0x800, 0x200, 0x9], [0x9, 0x800, 0x6, 0x2], r1, [0x0, 0x4]}, 0x0, 0x7fffffff}, [@INET_DIAG_REQ_BYTECODE={0xf4, 0x1, "108ab7e95b108438149b9bc2993f570d77f4310a24799cc3e7a617dd76292f76755b4e987e56bf48494135bd205bd5fb1138b293beab0c7d20c5d6a5f50d54c240a8fda47e86fd41cd9240b82cd324c62c7a3a0c97941c5ad0211d3bf31216847f813cb629cddfa4d5231690d8f4c2b313571dcbd55809503f12821c149cdb2f63081dd80969910d710de214aa21dc023d6e9388e29632fe8e5253abb946276e7bff759e8c9156fceab367c192fdfd628f77c6ea8bfc0cc72fd34179982a4230e0872a0171bb30480d75bf215568d858a4c9913c9834edf59c4f36de4c4966d63b6faa9e9ae3e49d53420eb523acb2ce"}, @INET_DIAG_REQ_BYTECODE={0x98, 0x1, "0d4b5501a609454381aa4d3a320cc77efbf4986dc47e5f7b48f5f10e53a2cfa33d13d9727f17d6b38c5396c54f5b2d5f67d96cd7d4cee38ac080869fb438e7655fd7d65f5c408f2190b752d685646f6dc9b720008f4a27b31c180f5be363f3757f17fd79e911ff7cbace8c4818140701bedf18582dfa95d729bf7f3c390ad8d698e7977013f96b9afe56777152db32a4abfa9efb"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "276d367d8750e80af698fcf4e74e1786eec143797cb4a475c95fab8ae8c02077c3abb380da4818378f27fd66872f3830cc02eaf6b2c2072d25110a3c0f40ea2f288df95db3107748006f05c3dd23359d43a63993ae603ecf200bb62074448f6fe254d0145acee97658f632f2d9d2f13e105c818207ed103ba1161e9ebcc12c6b8fcdff386537785d94691ae6198bd07cab9ea926b951c78940171356334c3de52d9696b3a59863d5582abdad6f7b697401cbfd615cee63c1a399390e7a8dcce249c9d4e1930302a0910f8b58b4f9a42ca3c6453e7378ad93b3993b8350568931c2be523d8da3c5a6863036a323c44e9f1bced4b860971ee128cd2d335541950f8e2a0510873f22cbbf75a11e5dfc4bac242511b4038591b69d365029c80b15440029cedb0d980e7496e69b9e9dfe44a0f8ff62dc4ebaeded5aa6b8d65b49e24c88eacec04ebc12473fa82e1fd9eb6f4e38466602c6451ee856e384afe4ba26720cd72e1c2ae05ecc2273b66f679cb30a6f57f35ca5b0cad429bfb8c5efd73480b6d6460c7f14b5400fe290b7c9fef10cf2bacf71f3968085d2548b704ff2e374463dda415aa64663d976f65fa099237855d83430978a35b71867e0e15a214a53de6e2215f56a39b8c349a37f51fb37191d7bd59b608ff89b0e558debd3fcef963bf76915e1b18b870632b11236ddaa20f7121a7f9cf47d317e5bff192ee344d53fd006bc1ec06ef541850dbd55e5f9e7e5138e757e50f642cc4fbfc9d179155b0808880529829d8f2f874850a582d9a28c183dd5dccc7827cdc3e03076c7bec4dc320a3ab3e7a1845d6da02470599f5abddbc60065f9b6b14269f8d7a8456797bc6ec3ed52af50158053d86bfefc4014345050abd1ce56272ccdfd9e30871476b622d8cda5bde75afc27263ff528080182a1cdf9cf8742db52191fa0f7b32d1a99ec1782816ade81f5d81768948490271b80d089a29976666e8f966ba42f0905cd25ec8ffe81008dad4b59b9b34c605ab05ff12a0306a6dacfe1e85f407d67c7e61cb43bd3d8ec8c04283ca776a4799a34e41d2266a83acb9f1989e45f73c2d7b68dc5bf1800cad65c3c096e95975846a03c3163aa8182118e7a93884a21c842b0b9f5227880f0875257a774c275a6b8214e47fc7dd71650296b0a98a72fb49c60df56ca79a173ff58036704f5c566d992b0eb6ad1d1c9c9528ba1f56505682e84c3eb4d4087c57626e48755d3f3f28cbccd22c773e465ed4cd17ca0761440403d032b5e43df43ec0ec76c9b9d75270d7618ff278792ab4200b4fe8188d77490ec50611bb5e1ce82838038f88b6602666100efdec7a05335647988fc23baf79cff499dfb6a006698da25fffd07583a795dc082923fc9552a4d65114991e7cc1631f76c703fb946b5bd5f98b15d328a5981b68ea8d1535ebfe18f998b9a5a19c0d70e2678c9ac0b134295792a7d82ec17b0ebbd5d494db7e23e3c1d638fdfeb36b4c35227cde43a455a32fae584823be5be865555b2701bfedde0437a70b10be2af8b6328ad085e1c83da7d4175514fabae7b5ff2bff7d3f15a571c95e83a9aa5a9986d092a40c70a4e6049f7da5eed4e4113386a9e36c991c5e6ad58cfe94efb9444d34c4a107494749422222350b6cd597bd8072bbc0710b0eff8e3625b39043f8052b20e281709afa0d86edb2831326bb251c6146b9210eb7b57e13df3fdbed425ee418d17b5d4883ce487f863cf2cec50f56ec9c0289265d8c42f851ccef09b368d27502723515273a4067199e84fb7fef03bf7829498cfdcff90658b4d244699380f12b0d55497f8f82e102a823440a897c8113f137aa3d9011e598788b93d9c7abcde4adb652e97f6d0b0ef3a9b96a6ee552d73be092743913a63eb4a220272c2282e9efd20271988b91fea4c40c6cdaecad1e8d4fe360cbeddb538290638743a77f289cd302d63c5b12d40803be2dbfb178bad515585e2e89418a3a19e083736b0eb8fbe1ce96c5a70ce76a17049dc40502361609dff7f2dc951d7ec17acaf4552a99ebb5f1317f3eda8c935cbb52bea2484d7f2699551963e744456b6f55700914ddae1b8f572d12bd4307fb98cf7ec6126f20501a605dd5b9b39a40d2f17af384e0dad375ad17361a5ad2945089b5d15bafb69230650f52ddde62ad4a0191aa51dc504181908d58bf667f2ae24357700b066e539cd20f41be908c7817edda402c977d8eda0a3d709769400e57ac02eba85337528ca3fe187b77d066c9303162d0e74297c69c0f4ef6ded45ccd8901a937c8d5ddeafc1a5221338aa244eec457777ddfc1694b0363c60a150d9f2f6d184c5aa6c0c6c4ac75591197735fe3402c8fcc5f2ac877fc86d1754895f245d8ce820078d9bfd2ce7ca22da5851fbad04ee59827ee3777dc0a21aa1829a920ca205497d9015b62faddc27436fde63223515644be141cade48719d619298c92dc29fc8176ba79ea2cba115232b14fe5f4437719a877a95c82700ab5106fe88081fdaf5551d5d2652b5d5bcdeb169c55b4d6b3ed10519c4dfbed0560f189687f2df2f11afd6f09471e9137ef425c6d412760518653a6e76b2a7ed7fb935b3d1734c6ec2f20a3dc564d35c2545849c1b08e87ee2a985c79c6f465321a0ccbe6a833f0eafa20cf8596950597bbb118b6511a02d4451e1f4d7a7efb64d966ceacde6b557b78a58a0f095cf90c3e85b8e766db3afcfa00f9ba3631b7744cbb50edbec8a303cbacf1aef19ba2b5861768bd2e785bb861e27b5b585e506b56e1a1f1eaa77d6d62d81b5f0365a75db44a7bb0ecd84948e17adbe797ce1db1ca87e51ba5f3ac0c3b6a16624b37261143eff9acf00ddad2e87345513f8139a18b79475f03eaf6798d23886f9c29279d79768b3adce5ac979b1b430751a405e9ff2a96694b07fd243303b9a6b5a1d3314acc50eee88842c09f368cc63669dbe43feaeb2bec0739df81e67e174540d422623c664cb80ac9a7b6f29640f39c578094e8a8d37791da27a4bcd8b17919d233a4b756dd785285cd4b4bb26012ef447c16d6936c0dd1151942a8baf15ccc3d9be1417ebc871e87ecf8f78f843c79e4624c4cdd54ea42739e344c9dada85ead2f44b374812f21a98a4653738dae40827189d2e4f1ced7a0148e4fcd7775aa8f93f5f93690c6422eeb3d34415652672ba162c1d99b2e051493efb23190940d172f494de7d86bc283686b56229e6ec208ab69d9e24f75be8feb4bc233181fbc3357570089022f52d08ea16b5af04b965ad1a5a32fabf4fd4a34609c76b6023f768a10ed00d88cac6e41d25720578b4cbbb94a7448f3bb0274d44759a066e2e08b2e26f12ac1102f8e5387f98fca99b54b9932d224f6deb5ba2f098cd50b7c40f8256bbb750e985e55b747f65916bd661f33352e2fd5fb6b4390baba45097ea42733be7333e4837e22ab6ce990261bcb94292f3c8e95f15dfab70d9cd3d5c1623c48ba960e9dd37230ae2680c654a20d80c73c109a2cb5101ca3bb05e91a12a3e83e22a299360bd1bbf5229d9d47f6610f58fac4a6050c1bbd9780b7334ab35b636a372ba9306668f21ea4e96c77c24b7163eaaa3b96a10ec64f155d05242a01779eb2c29710b7d166f1cdc72d8b6670279a48f90273a99cb04366bcca5e65f2f41f1c21641c843e462baf3c840e742fe1310205f8a6cc38a899abf8b96b9eb15e0fa93421490195d56d478caaeff82c9206976e403ebc16a90b7700692bf3b152b50fce0cf1ec7b4d453a4c9426bf722ae7400224c016957288caf19d0ec890975a0f960d085e4e3be2c747707b634a98671ea99f2febcd4da481daf0d566ffee0665858946a0baf5b1a9a3ddc77228e2d1216379763fbd99e55b0f424f6e7441258e82ee128f3aed67ff6d75fc09671fff14c60e971720eafeaded8eea04240cf0aa79713d239408a69f004b6fc4a7bdbfa714809382e9f7266b328714c67f7ac6176f2b5ac85a890ca288eaa364bc82f16197c465e867e5f5319b3e9325e6141d837f99c8c5c877fd77b8131cc5819466d0e5bc921198d235edd0dd180b9b5f3a8ef9de64794f9113ffde87282d975cb7d98b73a7078171212f7a94ba9c3b73e91720606f918c954a76c200a4b25e82f8683f7a01ff26bfbde1a102a656260c4bc450dab16c84d754dfeb59284b8449e1de4899c80ad312833c77ae636bee78bf58497aaf5f6a10d5ae01a59a9aa28920d88a8c67fc5ad9ff4e8eaf5a186a5e4e9ca67201c48574d1ebb415ffb57db78653ae58e97dc2dba8223466e490209ade6248aa820549cc57e83e039aa5a85d2c3d291f628b1e4b164372e60cd1f0e06845b5b25405c3882db7219729125746a6d6b19bd07ad4fe44128b930d574cfab593faddc037a45d1882ced32504354f1ed22974a5e4736ff8b4ab02c66838fbdb827a2622fb03b7772f4a48af538cff39d4ca808f734f9ea660f4f2b129a5261f8a60ac3b787e733ee84cf60b2ac3c5bce219a419fc41d00c0731206697b66d9f29dc4bfe4045526eea65af86d647671e41cd07a6ea151e834d9946f7e9a993e325ff819b5de0305a0fd757a6800df5002d987836b5f87587e6072da95bed6798eee58c78e349a0044bd2a55ecc4351ae40b1668897471e3fd378c2ee805cd7b71c60a6b727b9a5a2ef92bfda3f3887b987f178965f52ee4e32e9036a9a83aeb2b1c67fb02d80dff4ba214a6835b4d201dbcf2be211afa8e32d0960f5ad638cc539b4d41b1b584ceda188779c64674c0f8ba291e4f12292faf601a8d7590135e98853569839ed2a0f08f01ac76e15e8a2e0031da91cf23a12b9a65f1f2ede4316a9001558da0c4c313f4ba8677daca697b75ec694936e63b4da26d02be13ed1592c7bd269d2744f47c41a5df5f83c1d4e84d66e6d97228b304fc77dbb122581f608203170e67b291e51d4b1748f36616d7e9996991ccf015fd4a481f3e203e70c209e0819c35b42fc59e6bbe007dee5dfd868e78b9f92f791b55e890b84d88f15ff2b62d30d7e9bfe1b3ca11e72da3eb60fb628b18a3a3ce21a9e062bc8a7f7dff2f290c80060389c5fd873ae0d23b4774d4e2e7c1af7801e83597b52c284036eb85dc0f067868184a742f9267364f9d06392ae41edf6f06f22187d17cd0f45ae583624a72ebd7a8b3909ac5e7fa62d7312a7b5e1b684f37d71ff0cecc84e8e3e589267136c951ff13440df7166658519d844e0803dd8406ebcd258ffb468624a92851f0e38f086e683ad4bd461304db372a111b6ed326d03f2d6d0c62ef4079fc8ab0969714e99aa8a9876d138116f66b098afa4b075218a035485eb19b555fbde1ad51f07900df9acdaafbcb7a7b0d915c4a7f46b93674a3d8a5d5396657e0fac145737d0f201e1f754d55f52ebe6d0e2f6c24ce82bf1e98762248ab806bd54a591418691ca944cb972349629bda815787b3956c085f81ea38d81cf8b74bc935cc9b711b5cb0bdbf128b837a6242254101ee6684785b6550d6a3189735b1c06411a59c60b9399d001e1f2ac4044c8cd9fc0cc73fa1d0bad643c6436e22e68ef398257d3629689ad9ebc5732a1aa5069fd847478c315884cfaa5368ce4e32abedeac5ffbe87ac5f1f7247ebd56f067eded347a0020dbeb8ce83c84a4d5a719d606d9495ba4174176041dae4eec0796e792d654165bbb514350d9a795af8b380866c5e189a10ca650d5bbcbf397c05d0d4aa4af687d6b54d8107d0690fb98f0ed54f83e7a78aadb3b649b70558fb3b402e60a81fe5a5c2241b9751ff774e4d1eef11477b"}, @INET_DIAG_REQ_BYTECODE={0xe8, 0x1, "8e6b3c129743bfe3c2a6e55a31a78f14b6616aa10b9d8a37084fcb2038252055f6d89ae714494fc445556a4bd5cb12a7a343d00254a217f82e1f3d6d373d191be78b453a2011bcc79cbe4004875b47e180dbb543824cbc03098dce432b96b85e7da616a9695a62d67fe72dae2a50d070a1f29c6b50908b7ce84ec0f449a2f8ff3cbb9e1dec39e517cfe4de2e8e9f81a743c3bccacaec01401dba8cdab571486948b044b031a2c7dccbb0fd09784b375010a668d7a45ff8a09f9c0bb7bac9594205b1dfb24a5104d57561f61e17b63232eab806bfa0aff9269a2e858f441d8856c5177c13"}, @INET_DIAG_REQ_BYTECODE={0xf5, 0x1, "bbcd5bede0245519f4997437cadff63f33cf406bcda20565818d44b8277a0c9382de99b4da85434006917254246c34b220e539cb74390f82dce6ae9dfad4b74f090195dbfec62a303ff2c80e0b9538c2648a6af54160fd98728f7062d2841cfca1fd8cd0b43b63930bb1106a6ad0df05dae94952f26a2be37790c4dad3709975962dc415ce917b765e62729f27fe479b44de6be9635cf41b54df90929279e26cc61c5a9a789c18d3f04fde504a8ab4309d18cc8ebda0d208c80957a3e80e085d5c5d958cb50eadb6d22a3f253bed5a02d966a45136fcc43ac00edd44373fe82bcd633b8a73adabd3ff125e373bcad434e9"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "c0270d3e7e8241c79d3b444813a050a01371eeb1f534cd7c25322fe5bb2e"}, @INET_DIAG_REQ_BYTECODE={0xc, 0x1, "ee642f205cfae9e4"}, @INET_DIAG_REQ_BYTECODE={0x61, 0x1, "350ecb258593a6a44d43a70f96457dbc0c6246ff6f62bc88d533bbd344a31e3c6cf483ed7dbc5ed9b7b44c25b5cb832b7a32f76eb3b41d6727af858d936075e7c0ad5f7419ffa87db5a1c8b542a6a0a6a3f4cf4e2d77c45f0b90d867a9"}, @INET_DIAG_REQ_BYTECODE={0x53, 0x1, "12dcbf6496ce53e56bc569165e72abc2646c53b2e619aa7e9006a0c51da881a88bc09820dafe5973b560275e0e10619a18e648f4342573136f3e7c874b4b5513a7f29cd6a088f34eeb33b5c35f3c85"}, @INET_DIAG_REQ_BYTECODE={0xb4, 0x1, "03b675c2d7ef61a6119e69c01f8ea81f1606348ab06849f1ec4b434f0baeb3627741ffde6c3ddb8af1f93fbf9ffc5378f1b6907ce900e5c3a29078d1007d7a2faa7a1c0c3e61711b7fcd008e03cb2c13b5b23db87e19fc12a78612a09be789c5bb0376d9fa4e4b3c5cbb5b6d999ee84ccdf3bb11985b1f32d0332d6a586f782c34a495707acfbf1ca0b1fdd665f2e8eca8927d2892f8e1032c79d5da81ad8287166a7c4df883ad3218f8193c83df97aa"}]}, 0x1558}, 0x1, 0x0, 0x0, 0x4c012}, 0x90) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="05cf7e2b", @ANYRES16=0x0, @ANYRES64=0x0], 0x2c}, 0x1, 0x0, 0x0, 0x42051}, 0x20040005) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x4, 0x4, 0x1, 0x803, 0x30, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x20, 0x2, 0x40}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000240)="30ef31319d3c15369f98813ef0517b8455cfaefc141c629f6aefc8cb7e966d8bebb0bacf0470f72790b9fd7fc0bc5512e53fe52c960a6a45237ea5013a6afa975eee72553cc95920b516e0144625711e19b058e5282acc41da0e07b4b00daeadf058fe6a5e667bfcac4a62bf9aebf1f6d6e2e4c4f5af7d2935481cb2ab74e734c953b4fc52a20d7ffd688f8cce05adc6dbc2ea4d256652b625d487f37f67f9bb5eaaae9ab1f011b2be1d6f955c2665b3af97c169c9e46d4e18ea18c653fc96aa44e187b115fd7ec4fb8c50060cedf94d8e4217d47ab9fef4ae686d07872add8e4ca3445c1b881c6f79dbf195fe976f4e874b", &(0x7f0000000340)=@buf="3d17ad4e0cf4a34be26fb151d6edfe1980d8200ccf05322625220cdb446588346da5d898514b95792fe1a8a145eb36e3544f83b0dde0efddd54dc9940ddb855e739c388d058c5c8e42ad007036bf1e04f58b91e4de0ffcb761c6469a735e31a889ad2d6e8320bb68be95ac588c6c95fec19cb413881aa7d6306b6d785a98ce307260d6dd6609cef6c327c79dfac68cf8b4ae76545487fce961ede110c89fdbd879112e98de47c671d3d51b62fec1b0603b12", 0x2}, 0x20) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCAPPLICATION(r2, 0x4802, 0x7fffffff) socket$nl_netfilter(0x10, 0x3, 0xc) 16:37:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x80000001, 0x2, {{0x13, 0x4, 0x1, 0x7, 0x4c, 0x65, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0x8, 0xef, 0x0, 0x4, [0x0]}, @ssrr={0x89, 0xb, 0x40, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @cipso={0x86, 0x23, 0x3, [{0x1, 0x12, "2c43f32ceff8ba76587adb3d9d3437da"}, {0x0, 0x6, "cd0de3c6"}, {0x0, 0x5, "f0d350"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', r4, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0xc845}, 0x90) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x400, 0x40000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x80, 0x80, 0xa640, 0x44, @dev={0xfe, 0x80, [], 0x1f}, @loopback, 0x80, 0x8, 0x784dfb65, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'sit0\x00', r1, 0x2f, 0x71, 0x8, 0xfffffe6c, 0x1, @local, @empty, 0x80, 0x8, 0x1, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:59 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:59 executing program 3: select(0x40, &(0x7f0000000040)={0x5, 0x1bd8, 0x3, 0x2fd, 0x80000000, 0x0, 0xffff, 0x7}, &(0x7f00000000c0)={0x0, 0x200000000, 0x8000, 0x401, 0x8, 0xf45, 0x400, 0x7fffffff}, &(0x7f0000000100)={0xe3a3, 0x7fffffff, 0x71, 0x1, 0x400, 0x1ff, 0x1, 0x6}, &(0x7f0000000140)={0x0, 0xea60}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x169a02, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000080)) 16:37:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x29, 0x7f, 0x8, 0x1f, 0x21, @private1, @loopback, 0x40, 0x40, 0x1, 0xfffffff9}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000054}, 0x4800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="5146d569b6904abf8339eb1677f69533", 0x10) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0={0xfc, 0x0, [], 0x1}}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) 16:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x33}}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x50}}, 0x4004890) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8906, 0x0) 16:37:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_newroute={0x34, 0x18, 0x10, 0x70bd2d, 0x25dfdbfc, {0xa, 0x0, 0x14, 0x4, 0xfd, 0x2, 0xff, 0xb, 0x800}, [@RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @MPLS_IPTUNNEL_DST={0xc, 0x1, [{0x7, 0x0, 0x1}, {0x5, 0x0, 0x1}]}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x20000850) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x700, 0x8000, 0x8, 0x4, {{0x1a, 0x4, 0x3, 0x0, 0x68, 0x65, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x42}, @private=0xa010102, {[@timestamp_prespec={0x44, 0x44, 0x27, 0x3, 0x5, [{@remote, 0x80}, {@dev={0xac, 0x14, 0x14, 0x22}, 0xfff}, {@local, 0x1000}, {@local}, {@remote, 0x4}, {@empty, 0x3ff}, {@private=0xa010100, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x34d}]}, @generic={0x7, 0xe, "dc33c16c00bc8c99ac77eb1b"}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', r1, 0x29, 0x5, 0xe0, 0x3e0, 0x2, @private1={0xfc, 0x1, [], 0x80}, @private2, 0x7800, 0x8, 0x5, 0x7}}) 16:37:59 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) 16:37:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x4, 0x0, 0x8, 0x9, 0x44, @local, @ipv4={[], [], @multicast1}, 0x8000, 0x8000, 0x2, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'ip6_vti0\x00', r2, 0x29, 0x4, 0x6, 0x4, 0x10, @rand_addr=' \x01\x00', @mcast1, 0x8, 0x7800, 0xffffffff, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="28808b401e4cd5822fcc149396f8716aea8f2abfaef0701d0437f713d17b0453f022c2574c4afaff766fc1cfebf996e637362c6728f626a9c337f0d5bde7628e2259564ee38b31a9182f847965d9cc7c768a3a17da74ac77f1a855188a82c69b69fc3be7bed9b413d2043d8c8902c330e2a556f432064d2e07a6051c030442a0cbf40522a6", @ANYRES16=0x0, @ANYBLOB="02002dbd7000fedbdf250700000006001a004e2000000c0010000000010000000000"], 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x11) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3fb, 0x4, 0x70bd28, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) 16:37:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_PID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x4000) 16:37:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x7f, 0x8001, 0x0, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7800, 0x8, 0x9d3, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl1\x00', r2, 0x29, 0x3, 0x18, 0x8, 0x6, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000, 0x700, 0x3e, 0x8f9}}) 16:37:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 16:37:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x7, 0x6, 0x61, @remote, @loopback, 0x7, 0x1, 0x4bf2bcf6}}) 16:37:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:37:59 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x1e, 0xa, 0x6) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:37:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:37:59 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0xc802, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80051088}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000000c0), 0x4) 16:37:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000)="4f9fbc57e4cbf27357e2a01629197e3c0de42bdc4c2cc2a446c1fbc978f7c728b674cde4038238d36abc8802c1b5755d929dd015f7d0dd2211033ecf434b", &(0x7f0000000140)=@udp6=r2, 0x4}, 0x20) socketpair(0x1d, 0x800, 0x1, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x70bd2a}, 0x38}}, 0x8801) sendmsg$802154_raw(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x24, @short={0x2, 0x0, 0xfffc}}, 0x14, &(0x7f0000000400)={&(0x7f0000000300)="45de37456fef014f4fba7138dde0851e458e2210b3cf13fbfa4b6640e2675b0fb25337f4082c5deccdf59a6a1bee7f075a23c2769535457ef975a9b32e013d3014d4bf1247edc755b6c278071318b5413a2a6181631f76478c557b7bf8a9c62a257ec682bdca16e14af312e90989bb8f376ae461c5cd69f249251c0eec964b128c7af6460aaad5edb08cf472e5f479d4e34c0338819d05bfc46adcb6d24ba66c400ea9e4b1596687b916cbd841a324a47f6a002d2a2ae34e4dbce2715b371b6380101473d9fd5f38822e777a73260af9e403810d365460546bed7035f6", 0xdd}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r6, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r6, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8001}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1a}]}, 0x4c}, 0x1, 0x0, 0x0, 0x801}, 0x840) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240)={0x2, 0x2, 0xfffffffe, 0x10000, 0x8}, 0x14) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c4580000", @ANYRES16=r3, @ANYBLOB="000126bd7000fcdbdf2502000000060001000500000005002200000000000600020001000000050005000100000014002000fe8000000000000000000000000000aa05000d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x80d5}, 0x4000081) 16:37:59 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400041, 0x0) syz_open_dev$hiddev(&(0x7f0000000100)='/dev/usb/hiddev#\x00', 0x3, 0x222480) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'erspan0\x00', 0x0}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x2, 0x8, 0x4, 0x40, 0x9, {0x77359400}, {0x3, 0x1, 0x61, 0xc9, 0x5, 0x8, "0d3ba18e"}, 0x2, 0x7, @userptr=0x2, 0x5, 0x0, r2}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:37:59 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8906, 0x0) r2 = socket(0x2a, 0x1, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r3}, 0x8) 16:38:00 executing program 3: ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_QUEUE(r0, 0x7c80, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xfffffffffffffffc, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x20, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x5, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0xfffffffffffffffe, r2}) 16:38:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x29, 0x4, 0x0, 0x2, 0xd, @ipv4={[], [], @multicast2}, @remote, 0x80, 0x7800, 0x7, 0x9}}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0xa00) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xfe}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x81) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) 16:38:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x63, 0x5, 0x3ff, 0x2, @private2, @mcast1, 0x1, 0x7, 0x1000, 0x6}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x111002, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000010", @ANYRES16=r2, @ANYBLOB="000428b57000fddbdf25070000000500220000000000140008007767300000000000000000000000000008000b00020000000c000f0008000000000000000600010004000000080018006401010006000e0000000000080009000200000008001900ac1414bb06001a004e240000"], 0x74}, 0x1, 0x0, 0x0, 0x200580d4}, 0x40c0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:00 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000fedbdf250100000014000800697036677265300000000000000000c93c3589bffa877f612c65158aa49a0008001800000000000c00100006"], 0x44}, 0x1, 0x0, 0x0, 0x40840}, 0x810) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000080)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x7421ac78, 0x1, 0x4, 0x8, 0x101, {0x0, 0xea60}, {0x4, 0x1, 0x1, 0x2, 0x1, 0x62, "4ec8870f"}, 0x7, 0x2, @offset=0x7, 0x9, 0x0, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:00 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) clock_gettime(0x1, &(0x7f0000000080)) 16:38:00 executing program 3: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x40200) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000040)=""/80) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) 16:38:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) socketpair(0x9, 0x800, 0x80, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x5, 0xfac3, 0x70, @mcast2, @private0={0xfc, 0x0, [], 0x1}, 0x40, 0x700, 0x0, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000140)={'gretap0\x00', r3, 0x700, 0x700, 0x6, 0xffffffff, {{0x39, 0x4, 0x3, 0x27, 0xe4, 0x65, 0x0, 0x2, 0x2f, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x32}, {[@timestamp_prespec={0x44, 0x44, 0x66, 0x3, 0xa, [{@loopback, 0x3}, {@rand_addr=0x64010102, 0x6}, {@local, 0x6}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x1a4b}, {@multicast1, 0xfffffc01}, {@rand_addr=0x64010101, 0x95}, {@broadcast, 0x1}, {@loopback, 0x6}]}, @end, @cipso={0x86, 0x28, 0x1, [{0x7, 0xf, "6df7a2d047840c2f5d1accf67a"}, {0x1, 0xb, "99fc87832617e71098"}, {0x1, 0x8, "1dd8d3adb696"}]}, @timestamp_addr={0x44, 0x2c, 0x63, 0x1, 0x4, [{@broadcast, 0xb7}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@private=0xa010101, 0x10000}, {@private=0xa010102, 0x1}]}, @cipso={0x86, 0x29, 0x3, [{0x0, 0x6, "aea5a678"}, {0x5, 0x6, 'N/YV'}, {0x7, 0xe, "b4ce4dc9e4e5fad6d81396c6"}, {0x6, 0x9, "0a740fb6c196ee"}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xd6, 0x3, 0x1, [{@remote, 0x1800}]}]}}}}}) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x1ac, 0x12, 0x2, 0x70bd29, 0x25dfdbfb, {0xa, 0x4, 0xfb, 0x3, {0x4e24, 0x4e24, [0x7ff, 0x9, 0x9, 0x8000], [0x3, 0x3, 0xec, 0x20], 0x0, [0x9, 0x6]}, 0x4, 0x1ff}, [@INET_DIAG_REQ_BYTECODE={0xdb, 0x1, "73b899abc968e7cf667c02810a9820d18ab17984ea01bf8d22a0977717d5c7224ed4de720a5070d334e659b5b3007f599d94061b92eaf97fd771efb451d2b2075d8c6f5f3a54b2dce697cef2f0cadd5cb52b9492b56e66e5238e7249752793794ba2b44987666e6901d2141f6a870d6dd975cdfc04c29943c431bd5754142beb6017d4c6e4e408a0b61090c7300f74dcf80df3b4120ed4679b6881d6e51d0b0552c7b9b3c0ae350ed95945429af0e0108f3706d38887e406398d33ab1f8ec568df58355dffee1e0ed9c3bd197104f9931cea242ccbb20b"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "17874cb1690e17da9db9057dca7312de146143908de8e22b7752044d8ad740cca06acb2a84bbb4df88a9cd2326adec7613b8a5730b5c3c17b8d78646065f153018ad3bc230821fbda8c7b692e6abdd920d017153783414114e21b9e617a0719f399312eee530fc7370545a93f2d53355e6"}, @INET_DIAG_REQ_BYTECODE={0xb, 0x1, "9d25300420c76e"}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x20001851}, 0x4000081) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x80, 0x7f, 0x6, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x1c}, 0x10, 0x8000, 0x7fffffff, 0xeab}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', r1, 0x4, 0x1, 0x0, 0x9, 0x1, @empty, @ipv4={[], [], @broadcast}, 0x1, 0x80, 0x10001, 0x336}}) 16:38:00 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e20, 0x0, @remote, 0x6}}, 0x0, 0x0, 0x0, 0x0, "a511ffb216a07f2cfb87abc83720b31e354e3750342198083e2ba93439dddd474ffb0cef9515ad3aee1c6376aec52f42c36e38aae0f6d6112b9a99f528533ec526e62181d0ea9d4d94f6168e2fa3ef9a"}, 0xd8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000580)="957e71d25b7f40cd073f41afd93cf162", 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8903, &(0x7f0000000280)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) recvmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/158, 0x9e}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000380)=""/85, 0x55}, {&(0x7f0000000400)=""/50, 0x32}], 0x4}, 0x100) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f0000000540)={'syztnl1\x00', &(0x7f00000004c0)={'ip6gre0\x00', r6, 0x2f, 0xff, 0x81, 0x100, 0x1a, @loopback, @private2={0xfc, 0x2, [], 0x1}, 0x700, 0x7, 0x10001, 0x91}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x700, 0x8, 0x8000, 0x2, {{0x5, 0x4, 0x2, 0x12, 0x14, 0x20, 0x0, 0x1, 0x29, 0x0, @multicast2, @multicast1}}}}) 16:38:00 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$HIDIOCAPPLICATION(r0, 0x8927, 0x4fc000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053e00)={0xfffffffffffffff8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "8461249486b2ee"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054e00)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "02c5fa8d1ed3e7"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000055e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000056000)={0x100000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xc1, "9079b4171ac2ca"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057000)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7e, "5cf28c82ce9ef1"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058000)={0x7f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "3e2593b4d6800e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059000)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "98f4e4b3d52fd3"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005a000)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005a200)={0x8001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "a187b2b2b4870e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005b200)={0x7b94, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "4f82f58538b915"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005c200)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "1375c414d84369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005d200)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "c1b8e2d120e4dc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e200)={0x202, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "e0fcb2a680e0b0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f400)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005f600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005f800)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {r2}, {}, {}, {0x0, r3}, {0x0, r4}, {}, {}, {r5}, {0x0, r6}, {r7}, {}, {}, {r8, r9}, {0x0, r10}, {r11}, {}, {0x0, r12}, {0x0, r13}, {0x0, r14}, {0x0, r15}, {0x0, r16}], 0x1, "45971bfe1bb2c7"}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:00 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x9, 0x3, 0x2, 0x5a, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x7, 0x7fff, 0x700}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl2\x00', r1, 0x4, 0x1, 0x80, 0x5, 0x36, @private1={0xfc, 0x1, [], 0x1}, @empty, 0x40, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x4, 0x5, 0x8, 0xa0d, 0x8, @empty, @private0={0xfc, 0x0, [], 0x1}, 0x29, 0x80, 0x6, 0x6}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000000)={'ip6tnl0\x00', r1, 0x4, 0x6, 0x3, 0x4, 0x20, @private1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40, 0x7800, 0x80000000, 0x2}}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="b7a0fcff10000000183b0000040000000000000000000000183500000300000000000000000000001800000003000000000000000900000018140000", @ANYRES32, @ANYBLOB="000000000000000085100000f9ffffff1838000001000000000000000000000085100000fbffffff18260000ffb5a72db9f10e2fc45c718ce75bd52f0a18dd68d5359cd75242f36ce61368ba757a4a5abfabe4ed76b0be50b0931b653e7ae55d0d1c17c0efb9b0facd2841f22e1f0581e3388bf700"/130, @ANYRES32=0x1, @ANYBLOB="00000000fcffffff"], &(0x7f0000000080)='syzkaller\x00', 0x3263, 0x9d, &(0x7f00000000c0)=""/157, 0x40f00, 0x0, [], r1, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x8, 0xff, 0x3}, 0x10, 0xffffffffffffffff}, 0x78) 16:38:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005b4c0)={0xfffffffffffffff9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6, "f424dce413a6f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005c4c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005c6c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "bd86bfc77bf5eb"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005d6c0)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "793b9dbf2509ce"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e6c0)={0x43e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "6bc92f5a05dd0d"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f6c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005f8c0)={0x3bb6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xaa, "8440bbf8e84116"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000608c0)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xfd, "cede8a86cdbb2a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000618c0)={0x80000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x24, "077b0ec80b4761"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000638c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000063ac0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "a3d4f8b2b7587c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000064ac0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000064cc0)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xb9, "b5f568aa722649"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000065cc0)={0x10000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "b9609ea23c1ee0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000066cc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000066ec0)={0x7e76, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x5, "bf3a6c6848dc76"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000067ec0)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {0x0, r2}, {0x0, r3}, {}, {0x0, r4}, {}, {0x0, r5}, {}, {}, {}, {r6}, {}, {0x0, r7}, {}, {r8}, {r9}, {r10}, {r11}, {}, {}, {r12}, {r13}, {}, {0x0, r14}, {0x0, r15}, {r16}], 0x0, "d9419e49033569"}) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:01 executing program 2: ptrace$poke(0x5, 0x0, &(0x7f0000000000), 0x1000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 16:38:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000017c0)) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x80, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="08002bbd7001fedbdf25000000000500130006000000080019010500220000000000060002000100000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:01 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000000)={0x4, 0x9, 0x4, 0x10, 0x9, {}, {0x3, 0xa86c6a91f720fa31, 0x8, 0x9, 0x6, 0x7, "f8c63ba9"}, 0x4, 0x2, @offset, 0x8000}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:38:01 executing program 1: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/135, 0x87) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:01 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000017c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40002400}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000180001002abd7000fedbdf251d01050015000100020000e0020100006bde493046cebcd10200000008000a00", @ANYRES32, @ANYBLOB="00ffff00000008ebf7febf0020336d0287dabe993e75e6b936c2df4cd42f732e7e9d297017dfc0776213550eeeaa3ab85874475c0167", @ANYRES16, @ANYBLOB="0c000b00000000e0040000e008000e00", @ANYRESDEC, @ANYRES32=r0], 0x70}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) geteuid() r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:01 executing program 2: pkey_free(0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$isdn(0x22, 0x3, 0x22) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000000)=0xe7) bind$isdn(r1, &(0x7f0000000040)={0x22, 0xbb, 0x6, 0x2, 0x9c}, 0x6) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2c0000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x2f, 0x1f, 0x7f, 0x41, 0x22, @mcast2, @empty, 0x700, 0x7, 0xfffffff9, 0x81}}) 16:38:01 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'gre0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x320, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x24040011}, 0x20000000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', r1) accept4$llc(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x100000) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x400c180) socket$l2tp(0x2, 0x2, 0x73) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 16:38:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x29, 0x3f, 0xf8, 0x9, 0x8, @private2={0xfc, 0x2, [], 0x1}, @loopback, 0x10, 0x8000, 0x4, 0x6}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:01 executing program 3: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x8, 0x9, 0x4, 0x4, 0x5, {0x0, 0x2710}, {0x3, 0x0, 0x4, 0x7, 0x2, 0x5, "d39a9073"}, 0x67b0, 0x1, @offset=0x3, 0x6}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:01 executing program 2: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x20, 0x70bd2d, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x88e0}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x29, 0xcb, 0x7f, 0xfffffffa, 0x10, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80, 0x7, 0x0, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl2\x00', r1, 0x29, 0x38, 0x4, 0x401, 0x0, @dev={0xfe, 0x80, [], 0x3e}, @mcast1, 0x7800, 0x8000, 0x2, 0xaf1}}) 16:38:01 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'syztnl0\x00', 0x0}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00', r0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x40, r2, 0x1, 0x70bd26, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_DEBUG={0x8}]}, 0x40}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r1, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x65}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x80}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x40408c0}, 0x4000) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x890b, &(0x7f0000000280)) 16:38:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0x1, &(0x7f0000000140)="3f99016efbc54f82dbad1836652432028ec2512b7fd232f327c13f7fb78dbf9c1861a53a9b9b778ec98c549b59e15979361242d3ffc5c4f4c108363258fca22ad8e1ac05263f1a4d976979ecd0e1ce7f9554f9c79f757b8e4801ec5e1eeaf16aa139108846f98209ebae96fab1b3462be1c48b4f414a6e04a2227e850599690e404b2268ad194e4c346e69", &(0x7f0000000200)=@udp}, 0x20) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000000fd1b889375a5e63c965b3b209d9a56f65d1e34e6ad0c766e99385c32f5c63e95d0ffed750968afc2e8a271f048ca16158ed1890000000000000fffab627c6e6abd108095a0db472f4d42d847ad59368b78280f92e2c1ada6da4298a7ef5a26cc7ee804717c8c8068336d501e71f9cfc44d47997ef5092bb560d63c11c2062465818ec1dc2ee019b3", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf25060000000c0010000100000001000000050005000000000008001100000000000500"/66], 0x48}, 0x1, 0x0, 0x0, 0x1c5}, 0x4004000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x7, 0x2, 0xe2, 0x40, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x10, 0x7ff, 0xfffffffb}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'gretap0\x00', &(0x7f00000003c0)={'ip_vti0\x00', r2, 0x8000, 0x7800, 0x200, 0x6, {{0x1f, 0x4, 0x1, 0x0, 0x7c, 0x64, 0x0, 0x8, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@generic={0x89, 0x11, "e04297b47500b21c09637b51c11da6"}, @lsrr={0x83, 0x1f, 0x12, [@multicast1, @multicast2, @broadcast, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x1f, 0x28, [@empty, @multicast2, @multicast1, @remote, @local, @loopback, @multicast2]}, @generic={0x82, 0x8, "3edf7d412036"}, @ssrr={0x89, 0xb, 0xe0, [@local, @rand_addr=0x64010100]}]}}}}}) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_deladdr={0x28, 0x15, 0x400, 0x70bd2d, 0x9, {0x2, 0x80, 0x90, 0xfd}, [@IFA_BROADCAST={0x8, 0x4, @private=0xa010101}, @IFA_FLAGS={0x8, 0x8, 0x200}]}, 0x28}, 0x1, 0x0, 0x0, 0x6000000}, 0x4890) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e22, @local}}, 0x0, 0x0, 0x28, 0x0, "c9dcd9959a153501192018a2c72d7077e636f6c942220ced606351a4ae97dc2cef97cd6a3be77f8bcfdcde2bc094f8d539114caf83f8d07d579187f1b5852e21f511b6093f566de40f7cd659fd0afd68"}, 0xd8) wait4(0x0, 0x0, 0x8, &(0x7f00000002c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2a, 0x3ff, {0x2, 0x80, 0x80, 0x6e, 0x1, 0x0, 0x0, 0x5, 0x8}}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x44040001) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1}]}, 0x1c}}, 0x8000) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r3, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x35}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x38}, 0x1, 0x0, 0x0, 0xc081}, 0x4044004) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xda, 0x1, 0x100, 0x1, @loopback, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8006, 0x80, 0x1}}) 16:38:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x8008000}, 0x0) 16:38:01 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x481c0a34}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r0, 0xc04, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0xffffffffffffff55, 0x1a, 0x4e23}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x14) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r2, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1a1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x81}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x4008001}, 0x8000) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8}]}, 0x38}}, 0x8800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0x8, 0xa9, 0x21, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7800, 0x700, 0x7, 0x8f}}) 16:38:01 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x300, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040)="e1befcad14a1155c44a5815b3ac7c70bc59085a9930d4bfb6aeb0312f6c72b99d73b645573f69877470af17a25aa94d091aa37e5ef07653d80ddd3f53cc5c16517a9301120968aa0681133eb4a63dadb5b4c9bf86b62fda8", &(0x7f00000000c0)=@tcp6=r1}, 0x20) 16:38:01 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'tunl0\x00', 0x0}) bpf$LINK_DETACH(0x22, &(0x7f0000000000)=r0, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8907, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r4, 0x4) 16:38:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000040)={'erspan0\x00', 0x0, 0x700, 0x7800, 0x7, 0x3, {{0x27, 0x4, 0x0, 0x8, 0x9c, 0x66, 0x0, 0x5, 0x2f, 0x0, @rand_addr=0x64010102, @multicast2, {[@ssrr={0x89, 0x7, 0x77, [@multicast2]}, @timestamp_prespec={0x44, 0x44, 0x66, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@loopback, 0x20}, {@multicast2, 0x7}, {@loopback, 0xdde6}, {@broadcast, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@remote, 0x800}, {@local, 0x2}]}, @cipso={0x86, 0x3d, 0x2, [{0x5, 0x2}, {0x6, 0x5, "21f3c6"}, {0x6, 0x10, "9377fc882dc19e8159afc809738d"}, {0x5, 0xc, "bffe1732c35bc6caa829"}, {0x7, 0xb, "8ce074b897117c81dc"}, {0x2, 0x7, "04ef6630db"}, {0x6, 0x2}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6tnl0\x00', r1, 0x0, 0x0, 0x1f, 0x3, 0x2c, @local, @dev={0xfe, 0x80, [], 0x28}, 0x1, 0x700, 0x4d24, 0x7}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) 16:38:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvfrom$llc(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000, 0x40000141, &(0x7f0000000000)={0x1a, 0xf, 0x33, 0xb5, 0xfa, 0xe2, @local}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x408f00, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000900)={r1, &(0x7f0000000040)="8777534969b3946cd12dc8419772532bb74c9e058924afb0b9fc44ecaf2aab61b4f1565382b17d3afa9fd0a6149f6f0886af2388be11da42a899b28633ae1fd3aae9d33b5a56", &(0x7f00000008c0)=@udp6=r2, 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0xfe50) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2c6803, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socketpair(0x21, 0x5, 0x200, &(0x7f0000000040)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8907, 0x0) 16:38:02 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x800, 0x1, {"da6b2156564280547b396574e77207fb"}, 0xffffffffffff2e5c, 0x3, 0x3f}}}, 0xa0) socket$inet_smc(0x2b, 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x3, {0xa, 0x4e21, 0x8, @private1={0xfc, 0x1, [], 0x1}, 0x10000}}}, 0x38) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e22, 0x81, @remote, 0x7fff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8903, &(0x7f0000000280)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @local}}, 0x0, 0x0, 0x4d, 0x0, "5fd348a3c3ffdc718795f7e5349b07b5d84405d49b88a39ed5493a761de45544a61ad5b4d7bfca6bcd175ac6df0ce56d7a9a09ab599224f98b4f8356d5783e357d6279a5aa165a37333770fde94454de"}, 0xd8) 16:38:02 executing program 1: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) read$hiddev(0xffffffffffffffff, &(0x7f0000000100)=""/231, 0xe7) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0xa, {"7f245f2232602686c9041a7355941e78"}, 0x1, 0x200, 0x5}}}, 0xa0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:02 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x43d3c978613e3ee2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'gre0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x20800, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000280)="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", &(0x7f0000000100)=@buf="914d21a23b6d5290fcec7b673df5e57728e792cbaf362f8c", 0x2}, 0x20) 16:38:02 executing program 1: sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x10, 0x3fb, 0x200, 0x70bd2b, 0x25dfdbfc, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x500, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x8020) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipmr_newroute={0x34, 0x18, 0xbcaf91beb0ec7db2, 0x70bd27, 0x25dfdbfd, {0x80, 0x80, 0x0, 0x1, 0xfe, 0x3, 0x0, 0x7, 0x200}, [@RTA_MARK={0x8, 0x10, 0x1}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5ec8c5ee019a993f}, @RTA_GATEWAY={0x8, 0x5, @loopback}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40080) 16:38:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x4, 0xffff, 0x4, 0x7, 0x3ff}, 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:38:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/input/mice\x00', 0x2000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x29, 0x8, 0x1, 0x6, 0x0, @empty, @ipv4={[], [], @loopback}, 0x700, 0x8000, 0x4, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000680)='/dev/btrfs-control\x00', 0x42000, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000740)={'ip6_vti0\x00', &(0x7f00000006c0)={'syztnl1\x00', r3, 0x29, 0x5, 0x40, 0xff, 0x38, @dev={0xfe, 0x80, [], 0x29}, @local, 0x7, 0x1, 0x81, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000780)={'ip6tnl0\x00', &(0x7f0000000800)={'ip6tnl0\x00', r5, 0x4, 0xbe, 0x5, 0x8001, 0x84, @mcast2, @private2, 0x10, 0x700, 0x1, 0x400}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000fcdbdf250700000006001a004e24000006001c000600000008000b00020000000c001600030000000000000014002000fc02000000000000000000000000000014001f00fc010000000000000000000000000001"], 0x60}, 0x1, 0x0, 0x0, 0x4000800}, 0x4008011) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x4) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r8, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r8, 0x89f6, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6gre0\x00', r7, 0x29, 0x7, 0x1, 0x80, 0x4c, @dev={0xfe, 0x80, [], 0x12}, @ipv4={[], [], @initdev={0xac, 0x1e, 0xfe, 0x0}}, 0x700, 0x7800, 0x3, 0x6}}) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r9, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$TCPDIAG_GETSOCK(r9, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="dc000000120000012cbd7000fddbdf250008052d4e214e21ffffffff00020000040000008000000002000015ff3f00010000000000000000d93e65740ff81051addc845bef7c4e09c890320e384c130797fc200a78cf5078205c", @ANYRES32=0x0, @ANYBLOB="080000000400000001010000001000003d000100a95b1f1d0397393af65b847e5d38ed457eb361b44c23fc8c6a3a1debf2868fad9005476ea70a4ff525e55506606161b62cf36a204e344b73df0000004f00010088b421adacf9d2ccf0145e10f5114c94ccabd1e6257b1c0756acfa5a9af654a4965efe024430c3f98b4ddf8992d947c31702000000b3bdea72083214834542c6e3b503409af5bb8cff4cff00"], 0xdc}, 0x1, 0x0, 0x0, 0x40000}, 0x24040800) 16:38:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:02 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400002, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000040)) 16:38:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000000000)={0x3, 0x100, 0x31}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCGVERSION(r1, 0x80044801, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x80d1}, 0x20000014) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25010000000c000f00db3500000000000008000c000300000008000b00040000000600030009000000080019000a0101020500210003000000"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x90) 16:38:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xcb}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x80) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid_for_children\x00') 16:38:02 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9a}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4011}, 0x8c0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8907, 0x0) 16:38:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400000000000}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x36}}]}, 0x4c}}, 0x240a4800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x1f, 0x88, 0x1000, 0x20, @private2, @loopback, 0x7800, 0x20, 0x200, 0x401}}) 16:38:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x4, 0xffff, 0x40, @mcast2, @mcast1, 0x8, 0x7, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddr={0x40, 0x14, 0x8, 0x70bd28, 0x25dfdbfd, {0xa, 0x8, 0xc2, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x400, 0x90, 0x3, 0xfffffffe}}]}, 0x40}, 0x1, 0x0, 0x0, 0x50004}, 0x40) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x2a, 0x800, 0xfffff001, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x4, 0xff, 0x2, 0x75, 0x0, @private2, @private2, 0x10, 0x700, 0x80000000, 0x3}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:02 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x115882, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socketpair(0x9, 0x1, 0x200, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x20, 0x9, 0x10001, 0x48, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x25}}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x10, 0x8001, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', r2, 0x29, 0x0, 0x3, 0x80000000, 0x24, @mcast2, @dev={0xfe, 0x80, [], 0x21}, 0x8, 0x8, 0x40, 0x4}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x315142, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8906, 0x0) 16:38:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) 16:38:02 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x20}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket(0x3, 0x6, 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfff}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, [], 0x1}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200080c4}, 0x40408e4) 16:38:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="00000000bce16eb1c46491b9d7c52e1800e7cb88c211da2292f59b7bc8510481368b31eaa97636a555a491c603b709bbf7510402914f23cf3013b6b389b0e59b038268ab6cdfd8cfa9abebed0bf78dfbcd51b4dd0c23184f463e75a6545d1a426f90723106b4ef9cd3729f218475f32e4029c0194cd48804a93620ae838fea3954fed3b2ecae819a6c", @ANYRES16=0x0, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl0\x00', 0x0, 0x4, 0x3, 0x1f, 0x4, 0x13, @remote, @dev={0xfe, 0x80, [], 0x1c}, 0x8000, 0x7800, 0xffff0000, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000500)={'ip6_vti0\x00', &(0x7f0000000480)={'syztnl0\x00', r4, 0x29, 0xc6, 0x0, 0xffffffe0, 0x10, @empty, @private2, 0x7800, 0x8000, 0x401, 0x5}}) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r3, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r2, &(0x7f0000000240)="20fc8253edb5749adeb5e1a936e5a3e7cdb042c77efa966ebbb1ce616c7cd4d29a9f174663a8b9fa6040e6db5b56bb13fa41889e1411a46695ff7311e1652d9f87f8ec2e28a5bfb9fc0de37260de82ae85c7cad43902a986ffb6fb44c7c14dd2090b87d874a386e3cde4aaf2e19a44104890b08bfedf375867ce50204f2a63e2b66050bfdc9d5ce9a8e97254f5", &(0x7f0000000300)=@udp=r1}, 0x20) sendmsg$TCPDIAG_GETSOCK(r1, 0xffffffffffffffff, 0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8907, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x2, 0x70bd2c, 0x24dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x24000040}, 0x800) 16:38:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000080)) r1 = syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x800, 0x10000) ioctl$HIDIOCGPHYS(r1, 0x80404812, &(0x7f0000000040)) 16:38:02 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'syztnl0\x00', 0x0}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x64010102}, 0x7}}, 0x0, 0x0, 0xb, 0x0, "fd2b0bc9ae0e6b20df3705e65c7d40ddc2d71e82ea7a5f04337b19db8bf3777a9a8b1a10917d55e7d8a9e9f637584e97b2eaf948d1afddaf099420e1324ac878580e23cb8a8437439d0c55436824cd2e"}, 0xd8) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x100, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x42100, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000280)=@ccm_128={{0x608}, "650215c51c080129", "c5802dd6f5ed7343eb18dc9825e51ed8", "4bef52ef", "43922ec9280225de"}, 0x28) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private1}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000040)) 16:38:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x14, 0x8, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x2, 0x4, 0xe, 0x6, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map={0x18, 0x9, 0x1, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f0000000080)=""/4096, 0x41000, 0x2, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000010c0)={0x2, 0x6, 0x7ff, 0x3}, 0x10}, 0x78) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r0}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8906, 0x0) 16:38:02 executing program 4: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8907, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="000327bd7000ffdbdf250200000008000a0002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x30) 16:38:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsu\x00', 0x2000, 0x0) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000680)={&(0x7f0000000600), 0xc, &(0x7f0000000640)={&(0x7f0000000980)={0x45c, 0x13, 0x300, 0x70bd26, 0x25dfdbfc, {0x1a, 0x1f, 0xa5, 0x40, {0x4e22, 0x4e21, [0x5, 0x1, 0x9, 0x3f], [0x80000000, 0x2, 0xa09, 0x80000000], 0x0, [0x8, 0x3ff]}, 0x2, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x8d, 0x1, "61e8692cbb092d5222260d5b21062a04abf1220ef214fbb1ac9e7db56689a19fc916e27ba0c5e3118c964536b8563aac762dfea8f3acd94773112533b2751c4c51e5f2f8bce4c66dabef1bfbf9a00dd306d46c8a5614b6e889f114c93b0cda5f6c39bd535f264e34ea4a7a0ba04634b0e9b41fba4b13b586a48402be9245becdaa8080d048147b32f1"}, @INET_DIAG_REQ_BYTECODE={0x79, 0x1, "52c050b41f1a32fc61d246ea51f58b9ffcbd6249b9f218754abebbd0eadbca76d002dd31a391959df979f22ce989935cdb59629bb818d5e766a07d7169f8bd8c1aaba8df1c6f0c171822929c0de897791506d7206e043da55a1a71dafcbeb1e269160ff8da2ea1eef0c9e1154427f7ddf738eaf92d"}, @INET_DIAG_REQ_BYTECODE={0x35, 0x1, "116af27e501970c63b820ce886352bb374de995ad12e29cbc2c9463ebe381ad776a972064e5a1456193f16b5956d4641db"}, @INET_DIAG_REQ_BYTECODE={0x48, 0x1, "8d5f54d735e68422c70aab9ac082963f4682efca3e97443f8c9b52651d602bc2d0e7babd3c52b1a653d6f53fc5ebd174f08c42c3f65bbf65d262fc6840d4b5091d4747fe"}, @INET_DIAG_REQ_BYTECODE={0x93, 0x1, "94eb8347034cdadb5a742ecc73655571e307bc0c8d8bd1918b6006510424706ad653f88f99485330fd1db3bf56efa4748aae924008f7229873411abcf9d8a438c238f6978ff1d7872f38c4916308664ec9f5f4a626b3611147f0e7dec67a46059af6dab22717c0089febd6050da3eef8341bb9e3ff064034f04e5eaf45f52af0eedee4ee5b4d44533df03a104fb928"}, @INET_DIAG_REQ_BYTECODE={0x100, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "fc6c13d7a1b0cd2a913f1e30195ea48bc57d515202ac01a79d2e5299cff210b0c397e090a4be1d8e2b4f69a04aa4fb7e3ea70e27f666e11d749364b5cba9a0ecdebd7d06cf417ea76bcbb2db6cbaaaba2b7f26802ebc6ddf2c82162abe4ad6deae24188df008d7c6cd7a43cc3a7a0b019681e19d144e2930a10fcc139532d8425d9d70da5c7bdaa9602c028b9e0fde6b2e9dd5d67fdb04ffd3b588e33f51e449b11925f3c8962ecc2e786cce00cdec5f486b867f2a4e7c03661855a4984c46045edbf7268430c00c6f4e4e4efa111debcc1cfe10275bd782df10ca37f7d33908f2e133cbf16d22773a"}]}, 0x45c}, 0x1, 0x0, 0x0, 0x20040041}, 0x4000000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x81, 0x7f, 0x24, @empty, @private0, 0x7800, 0x1, 0x2c28a032, 0x89}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r1, 0x11, 0x6e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x2a, 0x1, 0xae16, 0x51, @ipv4={[], [], @broadcast}, @local, 0x700, 0xd0, 0x0, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'ip6gre0\x00', &(0x7f0000000400)={'sit0\x00', r3, 0x2f, 0x5, 0x0, 0x1000000, 0x10, @private2, @private2, 0x80, 0x8000, 0x434, 0x1f}}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f00000005c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) socket$can_raw(0x1d, 0x3, 0x1) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000e00)='l2tp\x00', r1) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="20002abd7000fddbdf25100000000500040007000000050006000400000008001900ffffffff"], 0x2c}, 0x1, 0x0, 0x0, 0x20000094}, 0x820) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040014) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000000f06010200400000000900000000000000000b000400000006000b00ffff000005000100070000c39e24ec02e000050001000700000006000b000300000006000b00000000000500010007000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000081}, 0x4000000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000780)={'sit0\x00', &(0x7f0000000700)={'syztnl1\x00', r3, 0x4, 0x3, 0x3, 0x401, 0x42, @private2, @rand_addr=' \x01\x00', 0x8, 0x802c, 0x8, 0x8}}) sendmsg$nl_route(r1, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000840)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3c0001eb603ca6993e23b7fb0180100000012cbd7000fedbdf2500000000", @ANYRES32=r6, @ANYBLOB="000002000004000008001e00ff03000008001d00010400000a000200ffffffffffff0000"], 0x3c}, 0x1, 0x0, 0x0, 0x40040}, 0x10) 16:38:02 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:38:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000060780)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000060980)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000060b80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "c3694d77312b82"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000061b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000061d80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000061f80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000062180)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {r5}], 0x2, "007f91e88ae895"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000063180)={0xadce, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "3af0707e2dd6b6"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000064180)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000064380)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000064580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000064780)={0xd940, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "f9f2ecbdee83c0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000065780)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000065980)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000065b80)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}, {0x0, r6}, {0x0, r7}, {0x0, r8}, {}, {0x0, r9}, {}, {}, {r10}, {}, {0x0, r11}, {r12, r13}, {r14}, {r15, r16}, {}, {}, {}, {}, {}, {r17}], 0x85, "67a950d97a0899"}) 16:38:02 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:38:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) 16:38:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 16:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:03 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket(0x2a, 0x2, 0x3) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101901, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x4, 0x7, 0x0, 0x1a9, 0x8, @ipv4={[], [], @local}, @private2, 0x10, 0x80, 0x6, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000080)=0x14) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000100)={0x0, 0x5, 0x4, 0x20, 0x1cb, {r3, r4/1000+10000}, {0x2, 0x1, 0x9, 0x0, 0x0, 0x40, "25e96d71"}, 0xdb26, 0x3, @offset=0x6, 0x3f}) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) getgroups(0x4, &(0x7f00000000c0)=[r1, 0x0, 0x0, 0x0]) 16:38:03 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000340)='/dev/input/mice\x00', 0x80800) bind$isdn(r2, &(0x7f0000000380)={0x22, 0x8, 0x6c, 0xaf, 0x81}, 0x6) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="0000000051721e522a0d34d934cdf89f373e84b4fbe3621915d0c57b99f05d0be966f686782c10aa11648e06568aca1774f723215e9b82f1a90854d8496f2c0f4bef886616dc2c1d0588869b500371f98be51350a5ad870304f48885d723a5b57428d8a3667575752d4a53369edcdd46056d2fd4e97888f3ad1e2d4f2eecf9ead7594c33a2a299075a1f15b259025ac80715a9f4ab53f5a56aacdf4887e930f3879f94f1", @ANYRES16=r3, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6ce12b1026f3cbc22c262e90afbaff2a2ab54b1017d86dde67400a99c5cee1bdb31196a849e2d10d1e3a3632d6c05bc60b0a3c5e00ab39c0cf924a4e2a8d6f4b1ee263474eeb1973f8", @ANYRES16=r3, @ANYBLOB="02002cbd7000fddbdf250700000006001a004e20000008000c000400000005000d0001000000"], 0x2c}}, 0x1) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) 16:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001640)={'syztnl1\x00', &(0x7f00000015c0)={'sit0\x00', 0x0, 0x4, 0x81, 0x6, 0x0, 0x1, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000, 0x8, 0x4, 0x10000}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000001700)={'syztnl1\x00', &(0x7f0000001680)={'syztnl2\x00', r1, 0x2f, 0x7, 0x9, 0x8, 0x24, @local, @ipv4={[], [], @loopback}, 0x10, 0x8010, 0x8, 0x200}}) 16:38:03 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f2, 0x20, 0x70bd25, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8090}, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000280)) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) bind$isdn(0xffffffffffffffff, &(0x7f0000000000)={0x22, 0x82, 0x9, 0x0, 0x57}, 0x6) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r3, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x40040) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, 0x1, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0xc5}, 0x400c0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x2f}}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x58, r4, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, [], 0x1}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1f}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x58}}, 0x40) r5 = syz_open_dev$hiddev(&(0x7f0000000040)='/dev/usb/hiddev#\x00', 0x0, 0x2) ioctl$HIDIOCSREPORT(r5, 0x400c4808, &(0x7f0000000080)={0x1, 0x3, 0x4}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:03 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:03 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x529300, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0xe8e6671ebe45e93f, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f00000000c0)) 16:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x3, 0x1, 0x5}, &(0x7f0000000040)=[{}, {}, {}, {}, {}]) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x200, 0x70bd27, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x48884) 16:38:03 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:03 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x20, 0x1f, 0x41, @local, @private2, 0x80, 0x21, 0x6, 0x7f}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', r3, 0x0, 0x6, 0x20, 0x8000, 0xa, @private2={0xfc, 0x2, [], 0x1}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x0, 0x8, 0x2}}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4abc}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb6}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}]}, 0x44}}, 0x48090) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r4}, 0x8) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000300)={0x0, 0x2, 0x4, 0x4000, 0x3f, {0x0, 0xea60}, {0x2, 0xc, 0x80, 0xf8, 0x4, 0xf9, "b8f2fd76"}, 0x10001, 0x3, @offset=0x6, 0x7f, 0x0, r2}) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="7d0e36be06b117c4a7f8ee2f3ce7ddb6e958eb83cf52fbf79e1ecc41b3f19ef360eb27f0282a816b6f237a", &(0x7f0000000040)=@udp=r0}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:03 executing program 2: socketpair(0x18, 0x1, 0x100, &(0x7f0000000000)) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x5, 0x0, 0x20, @mcast1, @private1={0xfc, 0x1, [], 0x1}, 0x700, 0x8000, 0x0, 0x5983}}) 16:38:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = bpf$PROG_LOAD(0x23, 0x0, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x44801, 0x0) sendmsg$802154_raw(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, @none={0x0, 0x1}}, 0x14, &(0x7f0000000140)={&(0x7f0000000100)="7ad789e9", 0x4}, 0x1, 0x0, 0x0, 0x4040110}, 0x40000) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000055980)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "33f03684b87ea8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000056980)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x95, "9165e618cca420"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000057980)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x26, "4aae6c9f4c9264"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058980)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x15, "3be12fb3bbd40f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000059980)={0xffff000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3, "00c49f5050775b"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005a980)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x6, "f40b476587c309"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005b980)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000005bb80)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "4f3f78851b480b"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005cb80)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xfc, "56a22c73cdc3d8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005db80)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {0x0, r7}, {}, {0x0, r8}, {}, {0x0, r9}, {r10}, {}, {r12}, {r13, r14}, {}, {r15}], 0x7f, "246f9be2b330b2"}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000080)={'erspan0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8916, 0x0) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r0}, 0x8) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="46098d17d639116717e5118d19beb6ed", 0x10) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x24, @short={0x2, 0x3, 0xffff}}, 0x14, &(0x7f0000000140)={&(0x7f0000000080)="a9791e5beb406e6813a441c8d08ab49fc4f0cd8a2e21cb44e062e41826bfc1207da4b5a4a5077b36159f3b0ca977d263b6298ab372cd777245e93d1d27fc516b16df10294168aabf99356df61327736e7b235bc86721b91298ef4348f99b2eaec2bddcb40ecd2f9323923a0a8d467caac95666803d3616fea6d7125e397d8ab7a035c3db4300373382c557c84c343610", 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000300)={'gretap0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x40, 0x65b, {{0x28, 0x4, 0x2, 0x39, 0xa0, 0x65, 0x0, 0x7, 0x29, 0x0, @loopback, @local, {[@timestamp_addr={0x44, 0xc, 0x6a, 0x1, 0x9, [{@rand_addr=0x64010100, 0xd00a}]}, @generic={0x86, 0xc, "9cea098b7d81d3aee028"}, @cipso={0x86, 0x3f, 0x0, [{0x0, 0xd, "40fb318d7d3e0818ebe4b4"}, {0x7, 0x5, "39ff09"}, {0x1, 0x12, "994460b4225c207de03d128bbbbacd13"}, {0x5, 0x3, 'b'}, {0x6, 0x12, "80c64435365f652567f8d45af33ceb69"}]}, @generic={0x44, 0xc, "16b70754d11625932cf4"}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x24, 0xd5, 0x1, 0x7, [{@multicast2}, {@empty, 0x7}, {@broadcast}, {@empty, 0x6}]}]}}}}}) 16:38:03 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2a1100, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000080)) 16:38:03 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000000f06010200000000000000000200000306000b00000000c7a2d356921d2aa20006000b000400000006000b00030000000000010007000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24008001}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x4b, 0x7, 0x28, @empty, @empty, 0x80, 0x8000, 0xc70}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r2, 0x4, 0x4, 0x3, 0x2, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2e}}, @private1={0xfc, 0x1, [], 0x1}, 0x20, 0xf8e0, 0x6, 0x3}}) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xa1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x18}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x36}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/btrfs-control\x00', 0x604180, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000580)) 16:38:03 executing program 0: getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2600, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040)="11ac6177048af2e20fb09edfb65ce0ea243e5aa9b2558e85900ae57c195ed059b5a5c88bbfc11754014f6d91f2875bff7e8877c23995d7fce96fb4e92ccf77136bde282580a5a52701110ab194f733307e908687856b7405ad9944dd28dc495e50bcb9fbe348d37d191c3dd0fd561096e8fab28ab7d31bc10502d8ea1f13156ab8a85b4cf9abe432d31eb8268c06bbbaa35973d8d53a40e75263bd0db488", &(0x7f0000000100)=@buf="99a8aa4457defc1fda316c614a58cce8e9fb65c84a2b6701b5e7c3b7cc3c81069c7f5effab680af8bb15c21340f70d4bf306a1a220359eaefcc76e2634f12e51f0d290b90ecb23ea337955d6f384b3449960150709c8d61d1c45d504c8175b18234789af6620929a2b333127cd258578e9d51faf09f45b4599f7f7e52e09e587fe0f7fa3eddbc6bf3c318f06c03625fe89736b08d0b71d01cfbcf1d34616a6f499201f2cd742f971f5d6a49233f45b"}, 0x20) 16:38:03 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x301002, 0x0) userfaultfd(0x80800) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0xf, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x10004084) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000040)) 16:38:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x21, 0x2, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xfffffeb6, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYRES32=r4, @ANYRES16=r4, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}, 0x1, 0x0, 0x0, 0x40010}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x4, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xec4cdd6777c46fce}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r4, 0x10, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x24004080) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCSREPORT(r0, 0x400c4808, &(0x7f0000000040)={0x2, 0x200, 0x94a}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x8904, &(0x7f0000000080)) ioctl$HIDIOCGDEVINFO(r5, 0x801c4803, &(0x7f0000000300)=""/258) sendmsg$nl_route(r5, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=@ipv6_getaddrlabel={0x5c, 0x4a, 0x0, 0x70bd2b, 0x25dfdbfe, {0xa, 0x0, 0x8}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0x6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x811) 16:38:03 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x4, 0x4, 0x7fffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 16:38:03 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2001, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) socket(0x3, 0x80000, 0x7fffffff) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x57d, 0xb, 0x4, 0x4, 0x8001, {r1, r2/1000+10000}, {0x5, 0x8, 0x5, 0x1, 0x2, 0x0, "a00dfcae"}, 0x8, 0x4, @planes=&(0x7f00000000c0)={0x1, 0x7fff, @userptr=0xfffffffffffffff7, 0xfd8}, 0x26, 0x0, r0}) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x400, 0x0, 0x4, 0xe000, 0x3, {}, {0x5, 0x1, 0x8, 0x4, 0x7, 0x6, "ebc9d2f6"}, 0x5, 0x1, @offset=0xc193, 0x0, 0x0, r3}) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000), 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8802, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x8, 0x1, 0x40, 0x6, {{0x29, 0x4, 0x3, 0x3, 0xa4, 0x4, 0x0, 0x4, 0x2f, 0x0, @multicast2, @rand_addr=0x64010100, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x10, 0xa3, 0x0, 0x7, [0x10001, 0x6, 0xf995]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x3, [{@rand_addr=0x64010102, 0x2}, {@rand_addr=0x64010100}]}, @cipso={0x86, 0x45, 0x0, [{0x2, 0x9, "8e8c7557ab6bff"}, {0x1, 0xc, "d56b7dd88ca7dfe3222f"}, {0x2, 0xa, "59b2cbfa3e84412c"}, {0x0, 0x11, "e9ab029fb47413fc041719ae4b3134"}, {0x1, 0xf, "e99c042d040d8b4f28f906cade"}]}, @ssrr={0x89, 0x17, 0xa4, [@empty, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @dev={0xac, 0x14, 0x14, 0x10}]}, @noop, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl1\x00', r2, 0x4, 0xae, 0x4, 0x58496aba, 0x2, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x10, 0x1ff, 0x958}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xaa3b62a2c23087c3, 0x6, 0x6, 0xffffffff, 0x12, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x80000001}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040)="421cf1df3ed4c03ac2de43b8b0d9b3be92cc527a0ddff01032363b1efda1365e8d371900ee7b6468ca5e336036b00bae8426617bda7566e31958d209e1a5663c195dc686d1db3f3247d9e373f0f30a3e6ff452f314cdabf6eaef249d9ab1f3c07e583a6a60d8967ad16a1d4458b7ff37818f41417f037960cd7cfcda0e8ece8e952b54caf1223213cc924a6877d98f1599f8223b9b1fc36cab1d119fc6ec4eae3c96a126e9a733eb", &(0x7f0000000100)=@udp, 0x1}, 0x20) 16:38:03 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1f, 0xfa0e}, @window={0x3, 0x1000, 0x3}, @mss={0x2, 0x7}, @mss={0x2, 0x100}], 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x400100) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000040)) 16:38:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000000)=0x80000000) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r1}, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x7, 0x0, 0x2}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x7, 0x700, 0x4, 0x8, {{0x1d, 0x4, 0x0, 0x9, 0x74, 0x65, 0x0, 0xb4, 0x4, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x41}, {[@ra={0x94, 0x4, 0x1}, @generic={0x86, 0x10, "39efcf04a5d95fdbab88ddb41e4a"}, @noop, @timestamp_prespec={0x44, 0x24, 0xc0, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@dev={0xac, 0x14, 0x14, 0x1d}}, {@rand_addr=0x64010100, 0x9}]}, @generic={0x44, 0x11, "b0ffca7d0de82c569a407292c1d2ba"}, @generic={0x7, 0x7, "441842b1db"}, @timestamp_prespec={0x44, 0xc, 0xc6, 0x3, 0x3, [{@broadcast, 0xef}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', r2, 0x9fb9e67f1b6bbec9, 0x2, 0x4, 0x9, 0x48, @private1={0xfc, 0x1, [], 0x1}, @mcast2, 0xe0, 0x40, 0x3, 0x8001}}) 16:38:04 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000002800)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$MEDIA_REQUEST_IOC_QUEUE(r1, 0x7c80, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8916, 0x0) 16:38:04 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x8400, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x2, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x41}, 0x11) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x48, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8000}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x4050) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000280)) 16:38:04 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) getsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000040)) 16:38:04 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000000)) 16:38:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r2, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) 16:38:04 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000)="03a5500001a7dc8f6c7ab398224a80c2ccf0adfafd9d8fb1ca317184ed5339a61bcb5026c5e75fed51658322943ce9083f765a995558df6712d7bd9d65299e41ad2501640215cc0a7aea56cce0174d2ce558680fb26ede5aca00a1c304ade27d3905b3398074bac560b12e71f14880dd04ef116c404163cd79674ae3441c2b110db10a10c23de9bb611ab8786d1f1fb2be3a46fc28fae2faaf33e883f6ef4b7a589dbb1bc4297c3f1cb8c7cfe9643f93893991f9d1ef4b0a140c565876bb10fe92dcfa77ad37338295d4868d14009dfdfc9e79464489", &(0x7f0000000100)=@udp=r0, 0x1}, 0x20) 16:38:04 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x11}) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x5, 0x3, 0x1028, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x20800, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x80801, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x268, 0x0}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000040)={0x7, r1}) 16:38:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getroute={0x14, 0x1a, 0x8, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44844}, 0x2008800) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x288000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x80, 0x6, 0x7fffffff, 0x52, @loopback, @dev={0xfe, 0x80, [], 0x1f}, 0x8000, 0x7800, 0x20}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24000000190001002dbd7000fedbdf2502801007fd000008000a000008000300", @ANYRES32=0x0, @ANYBLOB="282f34210200000000000000bd42496fddb9edb13986a0948e1ddaf1e4e787de73be079d6b0fdcb146c31e52e154729dd308b3ceea38205e1f7b3f61ff0b5aaca9cbc5f967f8e2a7ade23eb293c8020ae7e3c06344f07aff52fb22d3a729e2bd9d0b783b75e0ba93291e61766c21492ff7e4cc8c015b8407520da7a5697bbeb49df8f05fc25fc15f"], 0x24}, 0x1, 0x0, 0x0, 0x4004005}, 0x4000) 16:38:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) r2 = socket(0x1e, 0x2, 0x6) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000003c0)="e2758a807e9fc8aeaba19c3131961a75", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x6, 0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f00000017c0)) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r6, 0x6, 0x1, &(0x7f0000000040)=0x401, 0x4) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f00000002c0)=@gcm_256={{0x304}, "f24bf3888c296d97", "92d21cfa0776ee612d28faad5c744fdceee4a5e3ec0d10ecb6a68dd3cf6ceb63", "e7ee63e7", "9cb6a7dbf504b0b9"}, 0x38) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000400)={0x7, 0x80, 0x4}) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x8904, &(0x7f0000000280)) 16:38:04 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r0, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0xa0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000280)) 16:38:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x9, 0x0, 0x2, 0x10, @private0, @empty, 0x8030, 0x7800, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl1\x00', r2, 0x2f, 0x8, 0x73, 0x101, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x7, 0x7, 0x2, 0x10001}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000000)) 16:38:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=""/244, &(0x7f0000000100)=0xf4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="ff26e22838c53fe40643732b957495ed", 0x10) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@bridge_newneigh={0x68, 0x1c, 0x200, 0x70bd2a, 0x25dfdbfb, {0x1c, 0x0, 0x0, 0x0, 0x80, 0x21, 0x3}, [@NDA_PORT={0x6, 0x6, 0x4e24}, @NDA_MASTER={0x8, 0x9, 0x400}, @NDA_PORT={0x6, 0x6, 0x4e23}, @NDA_DST_IPV6={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NDA_IFINDEX={0x8}, @NDA_IFINDEX={0x8}, @NDA_MASTER={0x8, 0x9, 0x743f}, @NDA_VLAN={0x6, 0x5, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x24000004}, 0x80) 16:38:04 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc88328e7988be392}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0xc805) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8906, 0x0) 16:38:04 executing program 0: ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x7e76, 0x1, 0x6}, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) syz_open_dev$hiddev(&(0x7f0000000340)='/dev/usb/hiddev#\x00', 0x7, 0x84000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCSUSAGE(r1, 0x4018480c, &(0x7f0000000380)={0x5, 0x200, 0x0, 0x4, 0x48000000, 0x200}) 16:38:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000040)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x40, 0x5183, 0x50, @local, @dev={0xfe, 0x80, [], 0x19}, 0x700, 0x40, 0x40, 0x400}}) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=@ipv4_newnexthop={0xd4, 0x68, 0x400, 0x70bd26, 0x25dfdbfe, {0x2, 0x0, 0x1, 0x0, 0x12}, [@NHA_GROUP={0x24, 0x2, [{0x2, 0x5}, {0x2, 0x8}, {0x0, 0x3}, {0x2, 0x7f}]}, @NHA_OIF={0x8, 0x5, r2}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@private0={0xfc, 0x0, [], 0x1}}, @NHA_GROUP={0x14, 0x2, [{0x1, 0x80}, {0x2, 0x1}]}, @NHA_GROUP_TYPE={0x6}, @NHA_GROUP_TYPE={0x6}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @SEG6_LOCAL_OIF={0x8, 0x7, 0xfffffb9a}}, @NHA_GROUP={0x4c, 0x2, [{0x2, 0x20}, {0x0, 0x7}, {0x0, 0xff}, {0x2, 0x7f}, {0x2, 0x5}, {0x0, 0x8}, {0x2, 0x6}, {0x2, 0x7}, {0x1, 0xe4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x804}, 0x400) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010026bd7000fedbdf2501000000060002000000000006001b004e2200000600030001000000080009000100000005000400ff000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4044000) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) socketpair(0xb, 0x4, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 16:38:04 executing program 2: exit(0x7) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000007c0)={'syztnl2\x00', &(0x7f0000000740)={'sit0\x00', r2, 0x29, 0x0, 0x2, 0xb0, 0x32, @private0={0xfc, 0x0, [], 0x1}, @mcast1, 0x7, 0x8000, 0x6, 0x101}}) 16:38:04 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket(0x0, 0x1, 0x740) sendmsg$802154_raw(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, @short={0x2, 0x3, 0xaaa1}}, 0x14, &(0x7f0000000200)={&(0x7f0000000100)="fc8fff4fef7e1f6fe61ba6f0ae83f67343b33fc5db84251b3742822f147b18d469af535c05753df408cab04e6a22cf9fd92113768f491677732475eb7302a9e58b1dd6bf837446f306be5eedc3126fe96baf715acfdb422b8625d81a66851ea5aa5a4430c59f2ac23f8e9e3d083b83a1bb5f4397f59ae95bc17e182f1a2c73b404776fbe77b46dae2a96168912df13a8b3961188a2a8e1035cb0fd7417c44d68d8b0b92aaa7366737c7a03e7bd310a04a1bad9bc2f3e7beb53169e750d0af64c1e53246d96454814b8c22d4de7f641d6781eacf185eeacd836b721783194c04ca7b3aefaf98310d77b9332a2ca", 0xed}, 0x1, 0x0, 0x0, 0x4004084}, 0x4000850) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x149080) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000040)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000280)) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0xf8, 0x13, 0x6, 0x4, @ipv4={[], [], @empty}, @private0, 0x7800, 0x7800, 0x9, 0xffff}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000a40)={'gretap0\x00', 0x0}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xf8, 0x13, 0x100, 0x70bd2b, 0x25dfdbfb, {0x10, 0x1, 0x4f, 0x3, {0x4e23, 0x4e23, [0xb2e, 0xcc6, 0x5, 0x9], [0xffffffff, 0xc50, 0x80000001, 0x5], r1, [0x5, 0x4]}, 0x3, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x72, 0x1, "f7b2c73b307c3e7270fffe5aae7f7ab5950123d4278c6cc0e28dd8734780ab279a91c8ed32d7c804e283c9ec711378579a2b0259336c68b232ce273f8fc25010dcc2e2c49b113d045242dc03a0fc304049355a14968bd52d92a6156135ee2365118a0116bc444e19354d65a5bde7"}, @INET_DIAG_REQ_BYTECODE={0x35, 0x1, "823969b4389ad3a2de4f966ace0999062b63e112e0ef573182f0ff8ff4f22d13503cfefacbade3f699c10f1fc3079c81be"}]}, 0xf8}, 0x1, 0x0, 0x0, 0x800}, 0x20040001) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000600)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="7c83b9d2", @ANYRES16=0x0, @ANYBLOB="02032dbd7000ffdbdf250100000008001700", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x20000000) accept4$llc(r3, &(0x7f0000000840)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000880)=0x10, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x24, r5, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x88c0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r1, 0x2f, 0x1, 0x20, 0x0, 0x40, @mcast2, @local, 0x1, 0x80, 0x527, 0x1ff}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000480)={'sit0\x00', r6, 0x29, 0x0, 0x3f, 0x7, 0x4, @mcast2, @ipv4={[], [], @rand_addr=0x64010101}, 0x40, 0x7, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6gre0\x00', r1, 0x0, 0x81, 0x9, 0x4, 0x13, @initdev={0xfe, 0x88, [], 0x9, 0x0}, @loopback, 0x40, 0x80, 0x5a4, 0x4}}) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000040)) 16:38:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x54}, 0x1, 0x0, 0x0, 0x24008080}, 0x4040000) 16:38:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="157fc471a62e4c9971b368e9413f4750", 0x10) 16:38:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x480000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040)="5656c4cca129bbd0df9e9c9236af7f29d65379d58341f06627db55eb16abcf3e5b0fd064190743146e2d76d30509e1e1062bc4cf7cf0db", &(0x7f0000000080)=@tcp}, 0x20) 16:38:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) accept4$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="ae8abf5e95ab6237e46f06ef6a951a8c330f5e04756f407a6a4c37505060aac9bf56477800", &(0x7f0000000080)=@buf="7e7833b1e5ba0338ace906b2e3dbbe96e6f7c4ced76e44e0eee3372b89d5117c96f2d6a6c1e1fdc7f2140316955011031cd02e2ac6c1cca50cf5a71fea93df9e5523e38e96b16175383a0178bc483e61f5c017ccbdb2bd5ecef75240347f5000225de7f15f5d9e9e82b382e7f194307056a36d4f09887a5d250cd92b23de80a60f7fa813d0e3760e288f397bb4f7a11867d9324b198e44140f475553c14dbdfdd01d6b713456be07c67e2d95463745b0b9c719b4f691ccd106b67ef3d7953a41e32b6bc6b11a83b3af14083ca250f088c59cec9b48ca95e09c09bae8a96db24fef31ca0e276c2dde306cc802ca55f6b34a6d08ff0e", 0x4}, 0x20) 16:38:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7ff}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x24}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44004}, 0x10) 16:38:05 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x0, {0xa, 0x4e21, 0x800, @mcast1, 0x2876}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000340)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x4, 0x20, 0x7, 0x2, 0x0, @local, @private1, 0x8000, 0x20, 0x101, 0xffffffff}}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000280)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'ip6_vti0\x00', r4, 0x29, 0xff, 0xff, 0x40, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x10, 0x7, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000500)={'ip_vti0\x00', &(0x7f0000000440)={'syztnl2\x00', r4, 0x7, 0x1, 0x1, 0xb4, {{0x28, 0x4, 0x0, 0x1e, 0xa0, 0x68, 0x0, 0x7a, 0x29, 0x0, @local, @multicast2, {[@timestamp={0x44, 0x10, 0xcd, 0x0, 0x8, [0x9, 0xe3, 0x5]}, @timestamp_addr={0x44, 0x2c, 0xd2, 0x1, 0x2, [{@empty, 0x8}, {@loopback, 0x3}, {@private=0xa010101, 0x9}, {@loopback, 0x7}, {@loopback, 0x9e3}]}, @lsrr={0x83, 0x27, 0x53, [@broadcast, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @local, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2d}, @broadcast, @private=0xa010102]}, @generic={0x86, 0xf, "e82ba892bafc9e8dab95f87959"}, @cipso={0x86, 0x13, 0x3, [{0x6, 0xd, "ccd98e198adfa381f8ab92"}]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="28bd7000ffdbdf25000000001400080076657468310000000000000000000000050021000000000048d21bb87193c1ceffd4b31b08000900030000000500210009000000050022000100000708000a000100000008000b000400"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) 16:38:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x140, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'sit0\x00', 0x0, 0x29, 0x1, 0x3, 0x8, 0x80, @private0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x700, 0x7, 0xe256, 0x5}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="2f1ac45a2f91b27ad3f17b0af1ade837145215aab051cd8de13a89cc4bf71a85e5ac2a9d622dbc8c484ee85340cd7546b2a5fe5a39f767f8ca03763bfec6469a11b5156094475384893e03fe08a5862c03bd8164a8da0ee376b9a1ddb3f204b97468066eed7f69d3150a42", &(0x7f0000000080)=@udp, 0x2}, 0x20) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r1}, 0x8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000200)={'erspan0\x00', 0x0, 0x7, 0x10, 0x896, 0x1, {{0x1c, 0x4, 0x1, 0x38, 0x70, 0x66, 0x0, 0x3, 0x2b, 0x0, @remote, @multicast1, {[@rr={0x7, 0x7, 0x63, [@private=0xa010100]}, @end, @ssrr={0x89, 0x17, 0xa5, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @broadcast]}, @cipso={0x86, 0xe, 0x3, [{0x6, 0x8, "d4f8497da00a"}]}, @end, @generic={0x82, 0xf, "39dc6b46a93a96fa0d3b9db9c6"}, @generic={0x88, 0xc, "2725dc19c9302c48724e"}, @lsrr={0x83, 0x13, 0x3f, [@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r4, 0x89f6, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x29, 0x7, 0x3, 0x40, 0x41, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x7, 0xfff, 0x3}}) 16:38:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380000001fd4a5f91f0cfaa9894672f2263b7a7ed8e56dcca84a7d8440c367d15fb67d71647f589c70358a30b89c06863e67b7c2e719069aebb7e0a92fdeb9972dc2ada5d96eecb9a113c6b06947dcaa670e31ae226cb8cfbda34e09a2bff14441585bb451ac441deb3a1c735a4b58ecf1eaf0eed97b3abe51c0c742fd9fbbeb35c24607b0b80bccf49d077d240732b090269e5ff12181a7e39073aba158d72dd3be31a1ad9bda91", @ANYRES16=r2, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x29, 0x4, 0x20, 0x797, 0x2, @private0, @ipv4={[], [], @multicast1}, 0x8, 0xf8d0, 0x7fff, 0x80000001}}) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, r2, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0xc5}, 0x8100) 16:38:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040)="748f842c8c8e3fe5eacf8a0d5c7ec1371589d1b0c266546785f5f54552810c8e4e97c3fd79081fc64f74990f45a975db66b94afd1c12b1636471252db452a32fb7f06c86631c54d1c8e6ca2b1610becb2681276cd0f7fed342f44d854c7e2ff263d10b35e089870a39832909eb6179bfffe0a0c698202d441b5d4b3456df6ff41f2e78995e6d047742f1e188c35f0cf78fdec84fb742afb8", &(0x7f0000000100)=@tcp}, 0x20) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCAPPLICATION(r2, 0x4802, 0x9) getsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x8100) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'sit0\x00', 0x0, 0x4, 0xe1, 0x7, 0x7, 0x2, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80, 0x7800, 0x100, 0x9}}) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x2e4c00) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'sit0\x00', r5, 0x29, 0x34, 0x0, 0x0, 0x4d, @private0={0xfc, 0x0, [], 0x1}, @dev={0xfe, 0x80, [], 0x1e}, 0x40, 0x0, 0xffffffff, 0x7fffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000640)={'syztnl2\x00', &(0x7f00000005c0)={'ip6_vti0\x00', r7, 0x2f, 0xee, 0x1, 0xa87, 0x8, @private0, @loopback, 0x80, 0x20, 0x6, 0x7fffffff}}) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e21, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}}, 0x0, 0x0, 0x27, 0x0, "5ac091ec51f6f9722147d84bbfc7497ef1ae0fb9d52c8e5f70071683b2fcbba1f5fa6a88758610bd3ea2d1acd39ad49717fedc8df847d41956b61f265d56234ef1ee498b9cc75646eccff19219e9e09a"}, 0xd8) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r8, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r8, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x81}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x10}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x1, 0x1000, 0x0, @private2={0xfc, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x44}, 0x8, 0x0, 0x3, 0x8ebe}}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000280)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsu\x00', 0x54800, 0x0) recvmsg$can_raw(r4, &(0x7f0000000580)={&(0x7f0000000400)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, &(0x7f00000004c0)=""/166, 0xa6}, 0x10100) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x4, 0x5, 0xed, 0x8, 0x20, @local, @remote, 0x10, 0x40, 0x23, 0x1}}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r6, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xc2}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000810}, 0x400c0) 16:38:05 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x101100, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x7, 0x8000, 0x9df, 0x8001, {{0x5, 0x4, 0x1, 0x3b, 0x14, 0x66, 0x0, 0x3, 0x2f, 0x0, @multicast2, @empty}}}}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x21a002) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'erspan0\x00', r0, 0x7, 0x8768, 0x0, 0x1, {{0x12, 0x4, 0x0, 0x3, 0x48, 0x67, 0x0, 0x1, 0x4, 0x0, @multicast1, @loopback, {[@ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x49, [@loopback]}, @cipso={0x86, 0x29, 0xffffffffffffffff, [{0x6, 0xd, "5ab498b139180d941c6ce7"}, {0x1, 0x3, 's'}, {0x6, 0x4, '\ad'}, {0x5, 0x3, '?'}, {0x5, 0xc, "87390541644966fbf621"}]}]}}}}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f00000000c0)="7c30025510cf6544179402b5b84ea7af", 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x890b, &(0x7f0000000080)) 16:38:05 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:05 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080), 0x4) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010a1a7e00fd010800000000000000000700080509ff7f0000797a30000000000c0004400000000000000004d78af00aac2e1a8d966c53ee17edaefc27d1726af54a3496de"], 0x2c}}, 0xc000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f00000001c0)="c5f054a4fbfc2515939518a581973816476e3bec8295e9234c12a6a01cd9a827cf203fda98f2ca4a1664b4b4445d20c153ae60451957c6acf47b46", &(0x7f00000002c0)=@buf="3cab98a3ed18740c6e41c89238462386728d981380e7d13572876bf1fe7ca8589fc94be6efa31730eaff2a428cce904b132d7377f10c5a5b6572fc543bbdabd42cbd30bbbfc935a9e8661ee5ca423b697797d0a8604d794eb0abcc576dc57b2e43314012cd354b4efdab84ae55c8b7ab7ea12177894ad04d18e5c78f7f06248ec2c7f4d45fb01ad22e2e8b8a82324f390961ae96a517a28229edb19ecab294d432", 0x4}, 0x20) 16:38:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000004) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r2, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7f}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:05 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:06 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x20000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00', r0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7b}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x8080) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x20000014) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00', r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r4, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x10) 16:38:06 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x8400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) 16:38:06 executing program 0: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8916, 0x0) 16:38:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="b25641e6b7a437e1644c632652db059b17ba3ad610e62c5fd5fb32720f6f46656b94a4b2e78a0a192858c75b0ae91a5211b6e103917681da23860d4a73a36de9871531f33f4869baf6ab8dbe26b3b33a6f7d477bbcb8d0be100a000eb3", &(0x7f00000000c0)=@udp, 0x1}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 16:38:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000340)='/dev/input/mice\x00', 0x400000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x8c, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x40}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PROTO_VERSION={0xfffffffffffffc9d, 0x7, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0xfffffffc}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8008}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x80) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x890b, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x111, 0x9}}, 0x20) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x74b3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040001}, 0x1) 16:38:06 executing program 5: exit(0x200) socket$inet6_udplite(0xa, 0x2, 0x88) exit(0xf3) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = getpid() ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x52700000000000, 0x1, 0x5}, &(0x7f0000000080)=[{}, {}, {}, {}, {}]) socketpair(0x1a, 0x0, 0x8, &(0x7f0000000300)={0xffffffffffffffff}) ptrace$peeksig(0x4209, r1, &(0x7f0000000380)={0x100, 0x0, 0x4}, &(0x7f00000003c0)=[{}, {}, {}, {}]) r3 = openat$mice(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/input/mice\x00', 0x400000) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000600)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x8904, &(0x7f0000000040)) 16:38:06 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x890b, &(0x7f0000000040)) 16:38:06 executing program 0: tgkill(0xffffffffffffffff, 0x0, 0xd) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x480000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) getsockopt$inet6_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) r1 = socket(0x26, 0x5, 0xffffffc0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getaddr={0x74, 0x16, 0x10, 0x70bd28, 0x25dfdbfb, {0xa, 0x1, 0x9a}, [@IFA_FLAGS={0x8, 0x8, 0x3f}, @IFA_FLAGS={0x8}, @IFA_CACHEINFO={0x14, 0x6, {0x40, 0x8663, 0x7, 0x20}}, @IFA_LOCAL={0x14, 0x2, @private2}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_ADDRESS={0x14, 0x1, @ipv4={[], [], @multicast2}}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x74}, 0x1, 0x0, 0x0, 0x8840}, 0x80) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x8, 0xc9, 0x58, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x40, 0x7800, 0x8001, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'ip6_vti0\x00', r3, 0x4, 0xfc, 0x80, 0x0, 0xa, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7802, 0x80, 0x8001}}) 16:38:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:38:06 executing program 0: accept4$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x10, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e24, 0x871d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80000001}}, 0x0, 0x0, 0x27, 0x0, "5492d7c973af0ab06819b8bb40be473d3242c2be82d34c42672fe2ddeafcc9ca25d0e58b6fbb72371f73df37ee58aedd15698aaa86c74b75d05055fd68b68293328dd7b3e0ede90ec0968b2764b6c5c0"}, 0xd8) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x5, 0x8, 0x4e9a, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, 0x7, 0x20, 0xb8}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:06 executing program 0: ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) r1 = socket(0x26, 0x5, 0xffffffc0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) r1 = socket(0x26, 0x5, 0xffffffc0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) r1 = socket(0x26, 0x5, 0xffffffc0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)="8deed9eeb6d2331abca5720b484017fc552855d0d4e737bbd4e55f900cb654aaf4857b9971d2ad69ae34ed1aaa232dd9aa709c1226bcc426b24a2c2dd0b2e39cb9c9ee36b9a3045d92cc291bd74a75c62806d03da39c9637f9cb15fcfe7bcbc72d484851643298182b7743ae2bd44dd6eb61a32e39c6a201be14d43a4abd83975533343c3c08f4604d40ebda74b2253af9f90cc968023357f3ee1d4347b78f35e8564b27d321", &(0x7f0000000100)=@udp}, 0x20) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x40100) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) 16:38:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f00000000c0)) socket(0x26, 0x5, 0xffffffc0) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/btrfs-control\x00', 0xa0540, 0x0) syz_open_dev$cec(&(0x7f0000002400)='/dev/cec#\x00', 0x3, 0x2) sendmsg$AUDIT_LIST_RULES(r2, &(0x7f00000023c0)={&(0x7f0000002300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002380)={&(0x7f0000002340)={0x10, 0x3f5, 0x400, 0x70bd27, 0x25dfdbfd, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x40000) recvmsg$can_raw(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000040)=""/179, 0xb3}, {&(0x7f0000000100)=""/227, 0xe3}, {&(0x7f0000000200)=""/32, 0x20}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x4, &(0x7f0000001280)=""/4096, 0x1000}, 0x0) 16:38:07 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket(0x26, 0x5, 0xffffffc0) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, 0x3, 0x8, 0x3, 0x0, 0x0, {0xc}, [@CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfa9}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x98}, 0x1, 0x0, 0x0, 0x4040011}, 0x4000000) 16:38:07 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x10040) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x28e00, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x2f, 0x1f, 0x61, 0x6514, 0x18, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x27, 0x789, 0x6}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x4, 0x70bd29, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x4850}, 0x4000085) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8904, &(0x7f0000000280)) 16:38:07 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socket(0x26, 0x5, 0xffffffc0) 16:38:07 executing program 1: socket(0x26, 0x5, 0xffffffc0) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x928001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000001}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:07 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005c8c0)={0xae7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x81, "816406db367f50"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005d8c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dac0)={0x100000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6, "28dfbbb3bd058d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005eac0)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "6d618dcd75ae3f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005fac0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x21, "a51b7883b28b31"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000060ac0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060cc0)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x20, "4b42db95f7b262"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000061cc0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061ec0)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "d324d29b0ad723"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000062ec0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000630c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "dfde32d97f2893"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000640c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xff, "1b89991910927a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000650c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000652c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000654c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000656c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "20097c3fbbf391"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000666c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000668c0)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0, r1}, {0x0, r2}, {}, {}, {r3, r4}, {0x0, r5}, {r6}, {r7}, {0x0, r8}, {}, {r9, r10}, {}, {0x0, r11}, {r12}, {r13}, {0x0, r14}, {r15, r16}], 0x1, "d590e926cd97cc"}) r17 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r17, 0x8903, &(0x7f0000000280)) 16:38:07 executing program 1: socket(0x0, 0x5, 0xffffffc0) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x50140, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc4}, 0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001580)='/dev/vcsu\x00', 0x4c4000, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001600)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000001700)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000016c0)={&(0x7f0000001640)={0x44, r2, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x808}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9e}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = userfaultfd(0x80800) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x4a02, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00', r2) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000580)={0x94, r5, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xfffffffffffffffe}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, [], 0x1}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x24000885}, 0xc) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000300)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x97, 0x1, 0x101, 0x54, @private1, @mcast2, 0x4700, 0x1, 0x9, 0x4}}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="6c000000021d185697206737734acd6e8c43544fa2c58fe6221b62b30875f2d961cf003679a41acaa83418e86ecf397994c230a056a8e323053a24c00748469fb34607a8cc6d277538f84ee524006c1f170b4e0600000000000000b6d88b26dd0cbd39b0533f5c5d54f2d0be1056cf", @ANYRES16=r7, @ANYBLOB="000829bd700000dcdf25000000000600030000000000060001000b0000000800190000000000080018000a01010006001b004e220000050007000300000014001f00ff02000000000000000000000000000114002000fc00"/102], 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x804) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="657273c91424b26f0f4fa28f8be37000"/27, @ANYRES32=r6, @ANYBLOB="80007800f4ff1ae6ee0d621357d80dfb3eb071f9927fff00000000800000000066100009"]}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000080)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f00000017c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, 0xfffffffffffffffd, &(0x7f0000000540)) 16:38:07 executing program 1: socket(0x0, 0x5, 0xffffffc0) 16:38:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000040)) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 1: socket(0x0, 0x5, 0xffffffc0) 16:38:07 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x7c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40800}, 0x8111) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x28, 0x6, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0xe2, 0x6, 0x7f, 0x24, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x80, 0x2, 0x5}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x20600, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:38:07 executing program 1: socket(0x26, 0x0, 0xffffffc0) 16:38:07 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000480)) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000100)={0x64, 0x0, 0x4, 0x2000, 0x3ff, {r2, r3/1000+10000}, {0x1, 0x0, 0x81, 0x20, 0x8, 0x2, "41a879ed"}, 0x3, 0x1, @userptr=0x3, 0x1, 0x0, r4}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) prctl$PR_SET_ENDIAN(0x14, 0x1) read$hiddev(r1, &(0x7f0000000000)=""/190, 0xbe) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$mice(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/input/mice\x00', 0x212000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000300)={'ip_vti0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="69705f767469fb29e5f546bfa44dee122ca43630000000000000000000", @ANYRES32=0x0, @ANYBLOB="8000000700000004000000064515001400680000dd2f907864010102e0000001"]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r5, 0x89f6, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'syztnl0\x00', r6, 0x29, 0x40, 0x1, 0x7, 0x10, @loopback, @private0={0xfc, 0x0, [], 0x1}, 0x7, 0x20, 0x9, 0x288}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x9b81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 16:38:07 executing program 1: socket(0x26, 0x0, 0xffffffc0) 16:38:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f00000000c0)="f5b35f04fca48272e753e74c2e", &(0x7f0000000100)=@tcp6, 0x4}, 0x20) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 16:38:08 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000053240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000053440)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000053640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053840)={0x100000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xff, "f75d33ff794cb8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054840)={0x1b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "da933c766a497a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000055840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055a40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "6944d98ca5689e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056a40)={0xae1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "18c23df40e58af"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057a40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057c40)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057e40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058040)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x5, "e7142b43ca0529"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059040)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x2, "1792c4dab1ee48"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a040)={0x224, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "af179d89c3ad1a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b040)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x9, "d13427504315b2"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005c040)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {r1}, {r2}, {0x0, r4}, {}, {}, {0x0, r5}, {}, {}, {0x0, r6}, {r7}, {r8, r9}, {r10, r11}, {r12}, {r13}, {0x0, r14}, {}, {}, {r15}], 0x1, "cb02de8e109249"}) r16 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r16, 0x8907, 0x0) r17 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r17, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 16:38:08 executing program 1: socket(0x26, 0x0, 0xffffffc0) 16:38:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000200)=0x576, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:08 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:08 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x28, 0x1, 0x3) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x914f409d0e4f2664, 0x8, 0xff, 0x10001, 0x40, @private0={0xfc, 0x0, [], 0x1}, @remote, 0x10, 0x8, 0x6, 0x7aa9}}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x3, 0x8, 0x401, 0x0, 0x0, {0x75531703782db042}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x892f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x364ee359a9bca2b5}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3a}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000010}, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket(0x2a, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f00000001c0)) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000002100000428bd7000fbdbdf2502000007020000000a00000008000b00000000000c0014008f77c3929dd4a5da36ecbbffea8aa8b4f0f3785933bc14773eccbaa5001682509e7ecd73658908f2ee04145fc7545876546122d5fb8065da899e6b77ce1d09cabd5262d438c0b9347058a7527bb8c75da77cf8504c07acb6454913883c283c4ccea27a7d1281a88615aa48d4e8db395ea94c8d2d40a858110eacc93bbd", @ANYRES32=r3, @ANYRES32=0xee00, @ANYBLOB="0c2b0c374f2c8f1c97f79b2c"], 0x3c}, 0x1, 0x0, 0x0, 0x4044841}, 0x40051) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) syz_init_net_socket$llc(0x1a, 0x492e35acf15a5cd4, 0x0) 16:38:08 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x22, 0x800, 0xb, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r3, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x20000001) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:08 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 5: ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000380)={0x6a, 0x1, 0x7}, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x241, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000b80)={'ip6tnl0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x6, 0x2, 0x20, @rand_addr=' \x01\x00', @mcast2, 0x1, 0x80, 0x3, 0x1000}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000c80)={'erspan0\x00', &(0x7f0000000bc0)={'syztnl1\x00', r2, 0x40, 0x20, 0x7fff, 0x3, {{0x27, 0x4, 0x2, 0x1c, 0x9c, 0x64, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x1f, 0x3, [{0x2, 0x3, "e7"}, {0x0, 0xf, "a7a55654119d2972b10e6a89c3"}, {0x6, 0x7, "829f17db8d"}]}, @ssrr={0x89, 0x13, 0x5b, [@private=0xa010101, @local, @remote, @private=0xa010102]}, @cipso={0x86, 0xc, 0x0, [{0x6, 0x6, "25f1a2e5"}]}, @end, @generic={0x94, 0x10, "dc5788195dd7577f830144bfc890"}, @lsrr={0x83, 0xf, 0x18, [@empty, @rand_addr=0x64010101, @remote]}, @ssrr={0x89, 0x23, 0x57, [@empty, @multicast2, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x21}, @rand_addr=0x64010101, @rand_addr=0x64010102]}, @ra={0x94, 0x4}]}}}}}) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0xb3, 0x8, 0x2, 0x1, @ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x700, 0x700, 0x10001, 0x1000}}) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2080086}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="fc00000012a0875022ee6a00040027bd7000ffdbdf25233f73084e204e2001000080ff0000001d00000067050000ff0f000020000000dcfa", @ANYRES32=r4, @ANYBLOB="7f00000009000000a1b9000005000000ad000100ec28a3e440da3b520dfefb21bab00749d1fd19bbc57f271e6c761eab3c6677e0073b8047eb83c55ad4b80e3a6116d39500f3fcfaee114a2e253157e75525a050389196d04aa1d89cb40e016280dd6ebca558022df8f6e8077cdcf3e21a4f808c7e0cb19979b487ed2b4fbc964292a2a345b9a9034f6f082799e34cf6579302d4ab4533c05218163918d0dc1e1759ee1292e64eb55608bc43405300be7580cbd6b4438450687a82b3c5000000"], 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x20000085) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1a, 0x0, 0x80, 0xffffffff, 0x880, r0, 0x7e0, [], r4, r5, 0x2, 0x2, 0x4}, 0x40) socket$l2tp(0x2, 0x2, 0x73) socketpair(0xa, 0x2, 0x5, &(0x7f00000007c0)={0xffffffffffffffff}) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000840)={0x220, 0x12, 0x0, 0x70bd25, 0x25dfdbfe, {0x5, 0x8, 0x1f, 0x2, {0x4e23, 0x4e24, [0x2, 0x3ff, 0xff], [0xfffffffe, 0x800, 0x0, 0x5d9e55a8], 0x0, [0x5, 0xc128]}, 0x8, 0x411649fe}, [@INET_DIAG_REQ_BYTECODE={0x67, 0x1, "202ec23af42aa0e5b1bd7ed5d1182ed8c62a3fb707c5d7662ca3eab2e81b4d4c8c7004304f66ad7e96660f428723915c5f6b52a5674068f266654a4f4fb1ab2c1ebaa754e8d419a14d30987c4c806a71cb9dcb5df208ad280cd696f0961f6c41d2cf8f"}, @INET_DIAG_REQ_BYTECODE={0x6c, 0x1, "bd43d5588f186e59e4e6fde3e107b560795e32184fd66eb048eb4e9bc8e19f66141d4d5084a1b28cb963ef704fb5e5775010c23c91a16c7b7f4d3657259925c75d373cd50709dd9d36abfdadc8c47aede60e9cc0e8c8328dd4ba67f3df655af99fb806d2378127ac"}, @INET_DIAG_REQ_BYTECODE={0xc4, 0x1, "eeb0d341c9e0a1a1b4abc72bb89c57e0933c8a6926e2d6e9fb983159df392508d05dd234c7e69ec96d53070efa57b032ce974c202863b7565624c836bbd4fd6cf577a44a5a76268c857685b11fcad7dce497481328adcd7078f20a4abd6e0ea02272445e1dc95d59f539d2d90acd495a60f05fe253c0c786b69691ff5455b375ffe1c7ad084d4c7d544df099e994229bc30f18a3c0e013742ae25a1fb17c99136c0f01573ec3d0aea986ac3e276ab48ebcf766f813c389a711ede7c5494992d9"}, @INET_DIAG_REQ_BYTECODE={0x3c, 0x1, "7963bab98ed6b38e5ffa75a8d2e63c3284755eb1da89636de43831c74c7d35be73154cebfe657f0400a8606a6258057001a01b35d4f4a755"}]}, 0x220}, 0x1, 0x0, 0x0, 0xc850}, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000780)) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x20000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:08 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:08 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) socketpair(0x6, 0x80000, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x40}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8000}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xa}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8800}, 0x80) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 5: socketpair(0x15, 0xa, 0xffffff2e, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x1534, 0x14, 0x4, 0x70bd2a, 0x25dfdbff, {0xf, 0xfb}, [@INET_DIAG_REQ_BYTECODE={0xf1, 0x1, "73def5eb59a6b85b3a7eb3d4dc369e4f5d4b3fab75d8d69cb4e131cf1d7c345724a3e2196c6c8119b938f46b3d4bd20a05a5abe56eec5928c20a07b9e6c24f66f567b0b350eb68ccf9decbee31c15b16df7323b0b965958b0f0e1136030a38a449199e62cc1ba7e836fec85be1de1dfd57fe402383f45d473415b98f93931a44f1421d5b015b97033d5b79138400746df9cff594673913f8d57babfd20f82065f582dac1603169d820d369cce88d1ea5104c14afcb0b19c2cf2c0c4901ddafefea32a25cc6c2f9c9d45355e9bb30e6eee31bfd45f328edea6feb23a2364f81517a042bf478783c32edad493cc3"}, @INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x48, 0x1, "0e564511251f666bd64f34ab8c6854977f5e0766174cf10a445edd09eb0876c4e0d95d9407c79fffdb8f13c5c50a5d0996465dd01f2518d05f942a7eb0737bfbb0d96407"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xca, 0x1, "1f0f7a9bdc59f7439ad92079f437da18925095dc0f4c316e5bf3f57eb4dd4787dece7794bb1447201548265b136b3a5648c4f494c61ae873042353d4d7560c2bb45f271f9a501d7138ccd37689536b188a2b7f0de91bf3031e064074ab28830dfb4c5429bce48e065235362ae2506365a9481f0fb6c6dd810ad6d77bbbb1cf646bf51472a9782cd53b98e680695da4060b0754694f4b0ddb6b2f2bf1b60e406eaa66f34ba689e89073c36cba038aeecf910976ccf8a23c13a7e4251c25bc74cbfc9b2ecf8d92"}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "7aafc9cba3d2f58f399da15bd297a5434d73041736"}, @INET_DIAG_REQ_BYTECODE={0xf9, 0x1, "52f4fa0f5baedbf334ee0f7d027c98103f28e7a7e5e4281969ad5a73b0597ba4a2ce4a47b05d21ee2a97d837d29107addcd682da5217e13dae7eccc63ba202eb86babe61b0eac0b3a820b01e0fb076f0048c2a4e2b68686712b7ca535b8bfe3bc0d52661cd7b0e958647708c98cc21428ef246bbdf5bb2912baed75a18f4963cc8c189c65cd3a65dab17aec23eaa8a3081f10a1232b1504df5cc07528b3778b86d31fa954ed5e476d16f84bce9f39b1bacc75ebe55dcf1e309d5283ffd70460a6237a9d9caf0b5b422ed9ff5f7c1ee0ca40b81323f6ffeba7be0e17a4d2a37271ad63646f7545b1b39f11920ced5b767261e02ecc1"}, @INET_DIAG_REQ_BYTECODE={0xfa, 0x1, "1539221f9825e9004c75d41400b32aaf5034631d5c9da901b19926bdfd005bc3280af7ba662081b46cf3beb197a4e008e239bc3737d1ec2d32e83411ac64b6193e4c9a0e2109db4f0e641fe50c6e74d814cc2a3b2351a7c37b514d67e61667294e096e5bb63fec20c412c71e2c4e8a22a607c45f05ed7c04b8061230d4b495c20c69f2c464dc6812bfaf1736ca247c44b36965260597bcb6077a3a1a2d3c7a8e427d52f1aa46c91765259eeca696bac19c19a620ebbc9085ce6ca4e20f2b3096a4563a100d54799ad447a8470a6d3455352918634a2868771d84f374c3af6f41c9b1dc50f55ed942ac1590d26364c4fff1301408b832"}, @INET_DIAG_REQ_BYTECODE={0x28, 0x1, "c0862e068bc946018ca3be0483561fd1363c78555f648430fb045415f202831483aa191d"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "6116bbb424148d8f09d19020ac34ce0d04a7d091af327d94400ed770cc480454d58742ad97fedd4f36aca977ea3b69f3a080935cd724fd42bc5b24e234208e174cb71e292d409cd525e52ccba17e9ade269306a93be188daa9fdd2ff836902d338c3b41627015a6b8dcd959d719fa13b5e4365d69155e448f0437f556c50acc0551d67f23aedc34dec999df3f343f637701842ce8d05fe5e600e1d2817e2e0c1e3f253497a3968579bbd2e71777c9f009a347a30fa3a72b8448e6d29c0542c0bb22fd4f12a501fda5e3180733c0dd1e6"}]}, 0x1534}, 0x1, 0x0, 0x0, 0x20042814}, 0x8000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000280)) 16:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x1668, 0x12, 0x10, 0x70bd25, 0x25dfdbff, {0x21, 0x12, 0x3, 0x7, {0x4e24, 0x4e21, [0x3, 0xfffffffd, 0x0, 0x81], [0x10000, 0x18, 0x4, 0x7], 0x0, [0x9, 0x9]}, 0x2, 0x4}, [@INET_DIAG_REQ_BYTECODE={0xe4, 0x1, "1dbfc585ef7e91845a59d951c2d56f1e0d202b90e75d9e275a143054f5d690d0aaf3348d3d6fc224a7c43edbcd417200a6eacc51a6e87a338eb6a732e00a69e801e964525719d0d42e8d404ec0859a131680e7191dc730faad0ed6d8e0f36a4382f67765cbd1a785dbe8d8c63e9f4bdc438f7ec51a219a60bc692e788d2591ec6cc106a16ce04ea67f5d9ee1b8d93475a84f37bbe52f682b36e6d23cceb0f309f9ddbd79da7142875ae8dd5af856c7fc338798834393e59b809d4bd53e27875c0750cd674fbf658a1aaad6b036c13ddd517144473392f41659600a500c7cae7c"}, @INET_DIAG_REQ_BYTECODE={0xaa, 0x1, "e3a9ead753f7d79bd837e619a96f259c05f94dacfe35d82d41e9b3272240507f87dc1bc5ba28038a08580d3cf87cde6f2dbecd8b06468c06cfbc444377368ea1aab9c6d5c60bb075940151dc1eebcdfcbe552408fea82215852711c1abacd38dad4753f89797619f10d7424faaa92f2d1c704659a9ee0454897b077ce723701a2a457890a34be5c3a85fd61416c1f974769be0dc4d58012190b14cd2b35ef9a45e7b12471186"}, @INET_DIAG_REQ_BYTECODE={0x103, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xdb, 0x1, "ed32b97af290a4c574396f51b96a6a35cc543f73dbe4a6942d21fdec5916f4a30f9f26657c412a28fe5f66edf9c0d301a98147f33ad7b2b4c4ffd12809a1d8438cafbabcd5613536a8a0a235010f5b145eb0219e97d063cb7c07f02ee628b836912b58f3ec7467816037d9fbe6a842c4b1d3ccc04b71d834d99fa7f83c2e65513103dd0cb23d141edf63f70ca21b767236c49dbad1b9be4fad0a25ba5348b7f701874f00d01a7ad48bf3426ae433d72aeeda5dcf16221a555b712908faa15dbf678676529ae0046059ce19c3acfbf98937db7d5308f22e"}, @INET_DIAG_REQ_BYTECODE={0xb7, 0x1, "0856807f02d06637729331b6db14699b6f2bc9085a20b4950eb677e42f71f66f50ef11bd265ec8d9301f9a33f948c6f7e8f4bb2be5ca51dc92a17c08c4e31881e786da7c26fe2e782f6e229ca908215d7441391ba043714b3fea89fe127627e66e366fe185ce9ff45b68640196b23022ad005355d4c140f8b2d48541a803f2cf63ad221383cb80aa19e604e14f433ff28e8a48861ec6a7b3d1efd070e866c8286176db33decf042723f248873c8e27361ffeab"}, @INET_DIAG_REQ_BYTECODE={0x101, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x19, 0x1, "b69e0785489aa6c9f71b8423eb5e77151c23fafbfe"}, @INET_DIAG_REQ_BYTECODE={0xd0, 0x1, "615b1395ba4189f907ce4c092e6ad9567b646efd03a4b1c0a59a75a239e2ab1b7f8c6a7bf909446660df7109b7878eb0a0c8706fbb22ed4d0d799b85b91be329c17c567bc966e7a886af8a90fcd2c7faf2ce301d3266307d95496548d713b8bd19c8f9c6da47918400e39d1ff9a60d46b316892fe9004426d1db0431a5d61cfffa6e78e8dd9dd006e764a08b8dd36906380a49e67d8fd9030aafb7e4aeda97484e7180e904039b784cdfd7eb3a8a2b28d7bce36d120a30738b0454c6a841acc09f86d2886169f1e0881e6770"}]}, 0x1668}, 0x1, 0x0, 0x0, 0x800}, 0x20000840) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x2f, 0x7f, 0x80, 0x1, 0x4, @loopback, @mcast1, 0x80, 0x8, 0x8, 0x7fffffff}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x800) 16:38:08 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x68080, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:08 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x45}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x44) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000140)) 16:38:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x70, 0x0, 0x21, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x33}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xf9}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3ff}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x40}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r3}]}, 0x70}, 0x1, 0x0, 0x0, 0x240000c0}, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000080)={0x5, 0x2, 0x4}) 16:38:08 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:08 executing program 1: socket(0x26, 0x5, 0x0) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket(0x21, 0x6, 0x80) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:38:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:08 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x101100, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/77) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:08 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 16:38:08 executing program 1: socket(0x0, 0x5, 0x0) 16:38:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)=""/205, &(0x7f0000000100)=0xcd) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000280)) 16:38:08 executing program 1: socket(0x0, 0x5, 0x0) 16:38:08 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) clock_gettime(0x3, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x2, 0x1, 0x4, 0x70000, 0x1e, {r1, r2/1000+60000}, {0x1, 0xc, 0x2, 0xfc, 0x0, 0x8, "855e773c"}, 0x6, 0x2, @fd, 0x8, 0x0, 0xffffffffffffffff}) clock_gettime(0x5, &(0x7f0000000040)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x8) ioctl$HIDIOCGDEVINFO(r3, 0x801c4803, &(0x7f0000000240)=""/226) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f00000001c0)={0x5, 0x7, 0x4, 0xe000, 0x3dc3, {0x0, 0x2710}, {0x4, 0xc, 0xff, 0xfa, 0xff, 0x4, "1dd6cc8a"}, 0x8, 0x1, @userptr=0x289, 0x1, 0x0, r3}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x6, &(0x7f0000000140)) exit(0x8) socket$inet6_tcp(0xa, 0x1, 0x0) 16:38:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="800007000000000945cf005400668000612f90787f0000010200002107071be000000144244839ac14140b000001ffac1414853b007fff0000000000000002ac14141000000748441414f1ac141411000000d41408056401010200000040000000000018a9a2d3134faaa5a0a06f75de99e8ef2164d71d7bc3823f6fa7c27fe9ecdfc0ce909b0cbd538c1a66f370080f146f3448535059e68b066af2e506c830ea0c0e46f28bb272b2e5d219"]}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x29, 0x9, 0x2, 0x6, 0x17, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, 0x8f, 0x8000, 0x254, 0x40400000}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x2, 0x3, 0x81, 0x6be, 0x0, @mcast2, @mcast2, 0x40, 0x1, 0x25}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8001}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7ff}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0xc010}, 0x8040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:08 executing program 1: socket(0x0, 0x5, 0x0) 16:38:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000000)) 16:38:08 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x10000, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x1, 0x5, 0x4, 0x4, 0xfff, {r1, r2/1000+10000}, {0x4, 0x0, 0x5, 0x7, 0x2, 0x91, 'aJ*m'}, 0xc4, 0x3, @planes=&(0x7f0000000040)={0x800, 0x1, @fd, 0x1f}, 0x1000, 0x0, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x8907, 0x0) 16:38:08 executing program 1: socket(0x26, 0x0, 0x0) 16:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:09 executing program 3: openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x101000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "65ded411ce2f1438", "68ad276ed28bd454caeb5d6dde01b221", "fa362a05", "3eee26574dcb3bc7"}, 0x28) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8903, &(0x7f0000000080)) 16:38:09 executing program 1: socket(0x26, 0x0, 0x0) 16:38:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:09 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x11, 0x800, 0x7fff, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x37b081, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300)='l2tp\x00', r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400eeff", @ANYRES16=r2, @ANYBLOB="000226bd7000fbdbdf2507000000060003000700000008001700", @ANYRES32=r0, @ANYBLOB="08000b0001000000080011000000000008001100010000000500070002000000"], 0x44}, 0x1, 0x0, 0x0, 0x4040050}, 0x44041) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/138, 0x8a}, {&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000180)=""/46, 0x2e}], 0x3}, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1f4, 0x13, 0x200, 0x70bd29, 0x25dfdbff, {0x27, 0x0, 0x8, 0x12, {0x4e22, 0x4e22, [0x1, 0xebc, 0x20, 0x4], [0x8, 0xaa, 0x4, 0x800], 0x0, [0x2]}, 0xffffff1e, 0x1000}, [@INET_DIAG_REQ_BYTECODE={0xa2, 0x1, "9f163dbc9a642a05d49b33e78c27d12acf8ddb77e04f3a274d927efd9d299cd392a98a3f78069b1a3b5a457f246d72599277c0058259bf5b5d358ee85e7c7344bc4017e1312bf9363b720a4fcda009759b712392edb4eebf2147a25c7a65775cec25b1315272ffd921c775d2f93f87120f869d2ebbfc886674c2bacbfb4b7de1998bb799c66db59e78d16ac7a61725ed89b004b5838292c4c6293cb0dfbb"}, @INET_DIAG_REQ_BYTECODE={0x58, 0x1, "9a081078531f2ecb0c95eb65554397e02afd48e55e96af711d7b8873651d039c9b6760b207e29aec7100b6c6dbc0d140d5d5af444852cd240e06c0da2ed6f9a1f6427c963ebdc448f02a1b499e0ba1f852708194"}, @INET_DIAG_REQ_BYTECODE={0xaa, 0x1, "e1ecc347b4f83d3d0bf9bd2e9ea4c858aaf12c4045f733a6f8914a2b7fa94a6e79768c01c9a6a72131248be469ec145cca34e89e8a3748361f73379c23e2feae87bd60f00fccf250567e212f1ce989fa5adc93af1c44cf994accd818b99625f0ed3b3daae374bedf0014755f4fc91c65f6e1e3fe8a866fbf643c47cf8a43b25f3d6e12b4ded651a08935a7d41454da04d8003974491d66e2937c0bd15bfaa91e0ddd4e9351e1"}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x20040000}, 0x10040) 16:38:09 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002800)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/216, 0xd8}, {&(0x7f0000001300)=""/156, 0x9c}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/235, 0xeb}, {&(0x7f00000024c0)=""/221, 0xdd}, {&(0x7f00000025c0)=""/168, 0xa8}, {&(0x7f0000002680)=""/111, 0x6f}, {&(0x7f0000002700)=""/219, 0xdb}], 0x9, &(0x7f00000028c0)=""/241, 0xf1}, 0x20) recvmsg$can_raw(r0, &(0x7f0000002c80)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000000c0)=""/72, 0x48}, {&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f0000002a00)=""/222, 0xde}, {&(0x7f0000002b00)=""/146, 0x92}], 0x4, &(0x7f0000002c00)=""/73, 0x49}, 0x2000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8903, &(0x7f0000000000)) 16:38:09 executing program 1: socket(0x26, 0x0, 0x0) 16:38:09 executing program 2: r0 = socket(0x1d, 0x631741b7a2d2a8fe, 0x7ff) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051dc0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xe6, "eae59a59e52b2c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000052dc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052fc0)={0x100000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0xff, "482fdcef89ea65"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000053fc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000541c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000543c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f00000545c0)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {0x0, r5}, {}, {}, {r6, r7}, {}, {}, {}, {r8}, {r9}], 0x0, "7ccfe621f42842"}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x1, 0x0) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', r10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f00000017c0)) r13 = socket(0x2e5e9d6f25d5ed20, 0x1, 0x3) sendmsg$nl_route(r13, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000005e00020025bd7000ffdbdf2500000000ddfe7ffb78bfe73c2df405e82f6a7b10c51dcb94e5a53aa1d2656d2aeba89e6a5829a3008046c270ca904140a5c4b8f4b8bd10372279af90681a239c4a48e5ce7134af3233bc0b0f9d97b85c6dd180c0669b745584e771340f6c8d41a31c34ee1bcf0ccbd377d9b7c04012f8bf4b78acc3873449383e05ddbd82a6fc48b38cb2eb2e77cbb04b1dcb511b94844cfc155e06921bff59c6ca1b", @ANYRES32=0x0, @ANYBLOB="03000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x20004004) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRES16=r11, @ANYBLOB="000228bd708dfddbdf250600000006000200010000000106000e00010000000000000000000047a261cd80124afa7929b05dfab1469ed35185240800bb56a8eba8095763056edf5e8d8cf6db8038e5b25e0b77b3bdd2e7632e3802c1c562992048a319a6"], 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x4000084) r14 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r14, 0x8906, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 16:38:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCAPPLICATION(r1, 0x5452, 0xfffffffffffffff9) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'virt_wifi0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x81}, 0x44892) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket(0x10, 0x4, 0xac) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x40008) 16:38:09 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, 0xf, 0x6, 0x801, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000200)=""/205, &(0x7f0000000080)=0xcd) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4a100, 0x0) 16:38:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', r2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000000c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000004adf85a0466999b30351b2d8829fec58a087fd577b3afaf1eebbb0da7df6a2bce0137197e47cc0302d18b8da5813e1cf98249ee41910ee0396547dcab3c077347937df25f824ae9bb517229f5c19bfaf01a059bb89c1d05187fb39d1ebc22467d478728da9659499c078", @ANYRES16=r3, @ANYBLOB="080025bd7000ffdbdf2502000000050021000100000006000100050000000c00100000000100000000000500220001000000"], 0x38}, 0x1, 0x0, 0x0, 0x64cab73da30cd82}, 0x4000000) 16:38:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x40, 0x20, 0x7f, 0x1d, {{0xc, 0x4, 0x2, 0x24, 0x30, 0x9, 0x0, 0x4, 0x4, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x1b, 0x1d, [@rand_addr=0x64010100, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}]}}}}}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x5f, 0x4) 16:38:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:09 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x80880, 0x0) read$FUSE(r0, &(0x7f0000000980)={0x2020}, 0x2020) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000180)={'gre0\x00', 0x0, 0x20, 0x700, 0x800, 0x10001, {{0x11, 0x4, 0x0, 0x6, 0x44, 0x67, 0x0, 0x20, 0x4, 0x0, @loopback, @private=0xa010101, {[@end, @timestamp={0x44, 0x28, 0xe, 0x0, 0x0, [0x6, 0x4, 0x3ff, 0x2, 0x6, 0xffff0001, 0x800, 0x3ff, 0x0]}, @generic={0x44, 0x5, "c1e117"}]}}}}}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8906, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@getlink={0x58, 0x12, 0x2, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x50002, 0x8}, [@IFLA_EXT_MASK={0x8}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x7}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'ip6gre0\x00'}]}, @IFLA_NET_NS_FD={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x30ce}]}, 0x58}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 16:38:09 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socket(0x2a, 0x0, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x20000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x40, 0x5, 0x31, @private0={0xfc, 0x0, [], 0x1}, @local, 0x10, 0x20, 0x3, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r0, 0x4, 0x8, 0x1, 0x7, 0x2a, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x700, 0x10, 0x9, 0x43b3}}) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002bbd7000ffdbdf250200000014001f00fc020000050000000000000000000009050013000200000008000c0000000000080019000000000006001c00087f0000050005000000000006001d00070000000c000f0000000000000000000500f000ff070000a2078091bdac84ea7db8"], 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x8010) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8906, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000980)={0x10b8, 0x15, 0x100, 0x70bd2c, 0x25dfdbff, {0x11, 0x40}, [@INET_DIAG_REQ_BYTECODE={0x29, 0x1, "6eefed275be211a4fec85c3a5eb3ae0e4d9c54f3c911fec447fad609b80ab2ec85c5a6bcc8"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x5b, 0x1, "407a71bbb56b149129683ad0b3ed57945dfea362480f5707ec3a8372c27b711bac93d41cca4e917b6fa2a13c04b3a463dd05006ce943d2d3f2f02a4fd0d539e3a8752892688befcf928c4bbe632f94fc5265122d3465bc"}, @INET_DIAG_REQ_BYTECODE={0x17, 0x1, "96c1a2dcc240fcd39744075955a5759c25d652"}]}, 0x10b8}}, 0x44080) 16:38:10 executing program 5: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="4dadb1714c2a77b77876830a47eb9a9cd4d40344fd625f79515589f63f93dc0a45e47eb51a344c466c8401579d48c284c152b366cb06ac0a4cf8af6bef50bc562567b075abdee4c351ae746da95e895ce3b1df22f11d12b3dfeeea9368c0fd9d2a5fb2210ce12a95adc49ac12922642be513ed4356a39abb474fea049026c88ea6af52918657e1f08e19507353e69437574382844ee40f0aac4074c49fdf4b35723a728adae96b3e54d3338b614879103b2cd69e43f86d15ba62934f20778ae86d2bb7c8c2e18cf3bf1ff81a0611aa75319d054668b97478c60716e152a9692236c7a5b5e762b1f1a899470396c08b1cb6af800e25324e70387df6ce7bf225c1d8d4273055fb3fad4fd311829ee7654c0de4ca23b1748648424453c0d1890c8ba1a099dab139dd51c04669e0a961886a2024e176ae29ec2b74c1801969b83acf8a3551c35c801c4a98976a16592f59b9066627860f75f79c313e5c9e58ae2f7285c5f2aa05f28c822c4ffde2ea80bec530000873e7fe38be0351be2d36cc5b2c1e2057eabefe716f828122c7b977534620e1a6f46094caf418a3532ba9560dc22bb923697b0264561714c6dddb26667990f3d88cb4f53e8c51eca87c30be9d0949e6e948f771751e83794aa0bd23d34362d9def07fa4997f9150d78c7121d9ef3dd15b2e33fc167cc5c2279919ddeb8e62007d199161ea2da7de74c440d6b489320371b433fa829648eca72233bd2b5c3b52b0935b9b54e4c3d67644383c0ac1bb213fd9e43525b5a91f2e06cb23f50e62abbd8961d0be7c8bedac86639b9798e1793331dbcdfe2e50856420ba4b2051935bae1330096bdfd5d0152d2f9d30a766b7d874b1862c7013b548a38af24a04478809f00c646bddd7b5453c75c78a03aaafb622a73344a54305a95c75f8501c7ed18722f16b08bd6732ec121775ce79add15752d345571ba38d11fd8932b3f0730bdb15878db6444401a72f9dd8c490d84315e56ede8aeb51ebadd19f94ea831c362940eb922cbd6e6e7edbc685b179f3b56b654760942799e1c42b7306583132c056aa124206c2bc3a87c67865125dc8d58a5803fd9f3f00db6ad50cb9e7f0b609a2b5aca10f3df8db3cc799bda69888f21a7274e88f1304bbf07c56e3b23c5fc167a89358adebbdbf0181b034452cd50761a5ec12c26615d2f04247eeb74d4762875864293d37ac4654e012df0cf826ba8b030f6fb7bab2e653b31594ea3e8b30da89e938ce6eb46676192c977deca5e063ba2aeab52b244196ef9dfe32ab288b25654b935fb967c31f1315b0c8db52d095e3a30db5a155d2494641712ed4dfd55867c7cae18959ff2c69acb9a538b666b5e0071310e29342e392b05c9df490e1b7fde3a79d8e3d1018e39efac008a37321e83e5d02af3e903537531accd25b9aaacbf91155adcbec0d6d8281c984ea562ad1ad76981ed6831762eddedea351a1613e4d4189f12ba8579a94aac230d6a0519a2622bf93b6437cf9eb6c01087266e299160e682064dc48629e30d2f00dbbef9aa4a9d473aee4591a5e9bc3a82c5321f307d73f6a4589963019fc78ea51b917ba53e6c086245369879e3e3c484bd64ee79f63547a90292b8bf02056a55fcb0abebf0eed778ee36c413d21a5e097626ac48ae8664018d0c7f98b359613245bbd01324ac2af3fcce4d95e35025b3600e3c5ed0eec8b716aff78e47219958bb84a09edf43af43ea2a2b65bf6bdedc1bf56c24572f1e798d97f595a3a5f47a447035f30284de093e66c8edcef173ed92b961253471b69e12ba34dac21937aa3b3ec7d10512df93bdcea96a035713d90c56bb15f63badd207eb2b43bb16fb7e76686d01dd82ddbddd87af72e7e2ddf6600e03d2d53e02d01341e427f9de6f4beddcb2afaab3501022807bc68f76105b0636502dcab6c91ad36abd28071f98b7db7ac24f0a7164045af5fa3ea01ec2ef3f46fc45b6323b962611b034544d6c43b6649c3cf2e77593680a6816ea25cb567c6739d176cfaaa378f641d76824d7be8f90857d74d4e7c1309130fe84283de75abb4212a70816ef693acf7b96b2e2815c204f235a4c89f72c41d140cceb0a5c566423442bb62ef5bb4bccf4dd9e362ce247a81acfa9e15292ec91c588ce687d3c9ac4ef28fe2b4a3b2f9823ea5ca6a0f6f0f391f08e8703c2b71e5bfdbf67350fc1ab348f2da87f967459650466d28a346a672c46f464e1f04116210d9a600989f646a77ba676aebf5bc19f1ef86d15287e91f9a2f021ebe376b715c4b6f428e68a9c53b505901ee0f96893d317b4b5bda35127875ca4314c59899b05e154b2cdff6fa657a9841e99d4af34dac31c3ce448e96e61bf6dafcde5a066f464d482a1e0060d1374fdb357fe245b14193697056611847ece0a98f90a9c3b9392b7acf09ec0f2e17b79306aa3a2d0b602dd4988d660808ebf6a6c15f1b4a35f5b379ff63a9a355891f59c89d500d3463730f70cf2501422f33f1d3c8f6f9f1f3b97ac538e90569133bb6e6f1275452ee9f0ae391cadf99b43f2180888c58b74000016bf234fc470b935adb3ba35557d870822b9a0508a783e718299b1ea18d0d332fe7fa08ebe5b557de279e5e6b9d70214a479bfe9492c49afb5158849908092e60fce9993c66b699e44961851893f0c613f67ae6b916694995ddd8a636bfaf6e0c11c68b94763352eac1c779d44b2016fdb2b2af13d39355751a649478727b8b98c4af82bceac648f80e1b20daa3563b0b26f648fa0c073852043c3b4b3c124643cdd5583ec4b37d8ddf3a622934b2c5a8327b2dddb64458fd43654d242ef88f20c80851c26b2ba45907dc62618f0bbaeedf482778d2cce256da6f1fbfb09118dad6e46d3c6e3dda6a8038e56c7c3f6ea174cd8fc152b88f4ec0fa001097d5cd15b698b2f5501a2236b52d7f45c3e56916c36fe569a110aa051ff850b023077e36e86ece47c40a7342cde56b6b7a70700153627bb5e683cb800cf1bbb6f783f8f514f4eaf02475793eae4adac33ed3743dcf0b23b9454f27d510bb4645f48963160f112e2facf0f042fc236ff67c2cd71252b7385004bc8172eed22a8aadf120ae9c161d27cd3afd416bd77d8668f84dde20adce1debece507307a8d7d261399c974cfbb834b650827629ac6787cb75ea11e02e8d1b38ef6925278d4138849fef188297693574e86419a8d599bd160bc5e65579e38dd6206a13762e3d2a8dc54e40cdfa8f8b021a818d5bcb4d00043fb893138fdb4294ee669fb2afb9ea6a7ba3dab60dcbdd8094b96f8fa280c71c4a965a31da0bae047c1e496d078b43b765f687a6d133bf3c06973a36f0685139717ee060e701177f7fb460ac3de5d5e34eb36393d67e5c8213ab17134450ea5978edc86ded483a56496f9c63aa392043fd5df2f04086bc5d9a90211b3109e1e640c8fb11519d5b293091ade1ac4fd04af5cbe0c5ba31e055b9ba9114d3dc7fbce3c684a9aaaafec68354e9af0718690965949c8baea34d384d12f68b692216dec268f445b89d1ed95fbe60008d18527ebc46f68a9975e050679b75acc4c1f349e46b0a4373c4926adc4a1a62f06cb175df8800de71388ff255b14bc573c8629e3e87bdb55dab4ffe973ad541108f0e34787c85f8a76c167a6dcc5a45e532f516b4fecb9d93e930231068ffb461e570501e5726df4df0be685a0c8c1f93107c0f5653fb1a1e5e508d61743e2c22fb7162c71eed3734ade4e51627c7ef0305a9ccdd65f03c9feb99d5870faac7245dde372ad457438d3259ec89a4b27458066786d55994f156ea97b6fdfc8fb626434a69c9bf5fd7f5ddde026d6d7004a863f6d75b0b020881089a1d1dca79bcd03354bf4c3505c358bcf2566a6e39974b3b05a04d32955eb732f83fa5ae1eaaffb86abd10336a1728a35c2ddd7f7096ffe4db2fffd1627a0fa9c1a8678678a8457f911544de3c6c15f0a8324ee307823b66ec4643c192edb04ff75e42d8b8e4ad56399c2ad5d4a97d8261a0710d5481b8a85a842e9a5cb475b2a4f5d392f3d7872dc794f5dd7152f6d95e18872a11d55e2f0b7c15f4aca0c2cbc6dec26d72aa4cbdae415da721f5a999606b1eeed00979330fa11b6a327d027742d35bb5ea6798ed702560b81c0e087d7c3e9ee69f4d47fb7a18dd8506215f3b46c5fad301c9ff9bbddd7d6cf066250616ae5e3823801e778cbbd8aa1036e91d4d5dc6ce19bdfa7e57359abeaed886dd8abdb824edce1dba8cddad1492f31b93133bb606c1e3c07b7ef30e4032d5e5638082dfc6b95fb4e19ebb760b44bbb483dc9cbf8b612ce6c03fd0fbe0a71cbbf00f8b5308ab5c84c53c74ebc987d71714c73b9738920eaaa47051eae04d31810d88447149642216b434fc052f1b8d468c6bb15ee10de1aa1b2706cb2514e63a66130c81593fc8997a77bc0ff010f52799442a62918d02321f94db0426d32dd952be2c801e32f672bf5bdcd90b5c7f90f987f7a5e43fe0987777781da152d9d918e1a09fb5fbdfaa9e0435143c55bfe738908c978eaaf132b84b886ff45454120da390d286e294ea7bab143178770ec4858388229c64467b8fea43dac5d144e4ce0263758ebd1cc3a43b349b9afb4eb410a311cd62fc122bebe1a7b1f4682035657f9ce0787b19ea37f2544c933189c07d2a8e7f6f7cdfa2ff4b587ac5e34a9992863a0a3f800990dda78aebfdf93825460d1d45dcb58b8fe98488b9f19cd084096b2199d0dfdd49b054bd94704f0464794d2de29fe453da8161452f7f46443092ba3930df77fdd6753b16e83d9f249ffc0e7a9309f175383a8fbc9a3c6c36f5dfdb831d7a23c8792e55d89c9704937dc0a100f54902d04cac5b86b2adb4ca01f29a08f50a75e898e30b96026a65d89c8e1ec533838d82fd6232fa02959f5c89455127b6a953f9204e34618d1ca5271fe8ec760e45212f5288ccf8bb536e109824f09266f2a5dd897b3105ae0d32d3cc27a15e196fe6560a33c9abeca798f3bc304f41f85cb0440d9604cf2cb825b76b8c3b7a6fe2327ab5a8056fb14cf9668fd72b88b6a2ef9b572fab24028afccc57d6e04d0813ed7a77f80332398ac67005b003c54233aac3360cb7219d5ce4b873a74521286bb49058c8a3530dc7562467f50c1cf4abff9935794cd750742afac81d3f79c4920c5ece065626f78f5a4b149f7761834e56864a74bf7b861213735bcd1b62cbaf88de7ce97030c8e9c88590f615224a596b199481a850a5de3afb566db3f8ea02fc1003bff9d6bb2750903eaf8a901e735c26fd651e42fa239ac6e5cd7fc3c943bb9618b5194888503a7e79de057c84314ba3eebe55960417d30f0a201c9676a6e33e54f0f35ea700e71bfcadc83104153f80f40e78edd83257803c5cbce6c0a35de30c492e74b3811c37b50f1d0df152871cf660bc36d8384bbdec035f4e152af96b2b417385e9e3dfd19a6a4a65cbb530a11eb32c9ecd24d98a90b8c1d1283e45d6bf27b46925f57d2a1de334259993859ed84b1cffe63f51169192737b8c618b929870d1b79d43bec48d5e4739a944ab9d3c75913224e0b77f9111accd4e48c9e66fcefd696d22f2a78cb6eea5439b8cc28ec1a704b107ee3d0eee13f7b22ebd45aaf5c6c7cfec126b9e00a6e4c861f0c2953ec6d2045a4be09c4d2a2daa1fe884618d21b87f566a90a6b1509d3ded1c34b47e9db5ef9ce3b84f2adf0ac5971198403a351843c8e1d4f1a43911a0fc9f7c21509705c91cd9739a0b730bc491982ce327088b83778ee0d58d74739024ac7e2130aaab8168b", 0x1000, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x6c, r1, 0x8, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_IP6_DADDR={0x10, 0x20, @ipv4={[], [], @remote}}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_UDP_SPORT={0xfffffffffffffe48, 0x1a, 0x4e23}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x359e}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8800}, 0x2404c851) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001240)={r0}, 0x8) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001340)={'ip6gre0\x00', &(0x7f00000012c0)={'sit0\x00', 0x0, 0x4, 0x4, 0x7, 0x8, 0x60, @dev={0xfe, 0x80, [], 0x2d}, @mcast2, 0x8000, 0x80, 0xc5eb, 0x20}}) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000002500)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000024c0)={&(0x7f0000001380)={0x1104, 0x12, 0x4, 0x70bd27, 0x25dfdbfe, {0x25, 0xff, 0x6, 0x6, {0x4e20, 0x4e20, [0xe50f, 0x80, 0x3, 0x2], [0x4, 0x80, 0x8, 0x3], r3, [0x401, 0xfffff801]}, 0x8, 0x5}, [@INET_DIAG_REQ_BYTECODE={0xb2, 0x1, "42d2dcde8a586877a2f345073809f7a5afabf6448d01723a01261fd446a2d8aaf28de36722cd0fcf625e705e2068a55dadd2a567d3c5767a7c9894a5ac549605e8de52162b25c0f4821764babd0c05ad6f8ea5248e99a6595156fa1d1f2ed3bac690a39554d4245a167a52a12c3b9e95919aed5260ed28f2ac3807f23c10068cfdf74265ce930e3a06e27169acd039d26613246f74d1124190ca02aae0aef840b0bedd2cfbcdd415e0122163641d"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x1104}, 0x1, 0x0, 0x0, 0x20000004}, 0x4010) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$HIDIOCAPPLICATION(r1, 0x4802, 0x5) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x4, 0x81, 0xff, 0x0, 0x22, @empty, @private0, 0x8, 0x7, 0x7fffffff, 0x1}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) socketpair(0x23, 0x80000, 0x45, &(0x7f0000000000)) 16:38:10 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8904, &(0x7f0000000040)) 16:38:10 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 2: getrusage(0x1, &(0x7f0000000200)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="b3a42b1d9af8ff0000000085100000ffffffff9500000000000000d45140000400000018140000", @ANYRES32, @ANYBLOB="00000000000000005f22ffff04000000"], &(0x7f0000000040)='syzkaller\x00', 0xc0, 0x7d, &(0x7f0000000080)=""/125, 0x100, 0xa, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x7, 0xffff8000, 0x1}, 0x10}, 0x78) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bind$802154_raw(r1, &(0x7f00000002c0), 0x14) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8906, 0x0) 16:38:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x30}, 0x1, 0x0, 0x0, 0x200c884}, 0x20044001) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009ff0f00"/22, @ANYRES32=r1, @ANYBLOB="00000000d35700009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x683, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x3, 0xffff, 0x8}, 0x10, 0xffffffffffffffff, r2}, 0x78) 16:38:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x28}}, 0x844) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:10 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x20, 0x7800, 0x4, 0x2, {{0x50, 0x4, 0x2, 0x5, 0x140, 0x67, 0x0, 0x20, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x40}, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x44, 0x69, 0x1, 0x5, [{@empty, 0x100}, {@multicast1}, {@private=0xa010101, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@local, 0x5d}, {@multicast1, 0x79cd100e}, {@empty, 0x6}, {@remote, 0x4}]}, @end, @timestamp_addr={0x44, 0x1c, 0x5e, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0x1a}, 0x4}, {@loopback, 0x1}, {@rand_addr=0x64010101, 0xffff7fff}]}, @timestamp={0x44, 0x8, 0xaa, 0x0, 0x9, [0xfffffc00]}, @timestamp_prespec={0x44, 0x44, 0x15, 0x3, 0x8, [{@broadcast, 0x6}, {@private=0xa010100, 0x974}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7ff}, {@multicast1, 0x5}, {@empty, 0x5}, {@multicast1, 0x1ff}, {@multicast2, 0x1}, {@loopback, 0xfff}]}, @timestamp_addr={0x44, 0x3c, 0xd6, 0x1, 0x2, [{@local, 0x800080}, {@multicast2, 0x9}, {@multicast1}, {@empty, 0x800}, {@empty, 0x1}, {@empty, 0x5}, {@multicast2, 0x6}]}, @timestamp_prespec={0x44, 0x1c, 0xbf, 0x3, 0x1, [{@rand_addr=0x64010101, 0xd39}, {@broadcast, 0x7}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x2}]}, @timestamp_addr={0x44, 0x24, 0x10, 0x1, 0xb, [{@rand_addr=0x64010102, 0x9}, {@multicast2, 0xc6}, {@loopback, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x86}]}, @noop]}}}}}) 16:38:10 executing program 5: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x3, 0x8, 0x801, 0x0, 0x0, {0xa, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8884}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x884c}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x17}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8100}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xb}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6001}]}, 0x98}, 0x1, 0x0, 0x0, 0x40001}, 0x20000000) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) 16:38:10 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x5, 0x1e, 0x1, 0x3b, @ipv4={[], [], @rand_addr=0x64010100}, @dev={0xfe, 0x80, [], 0x44}, 0x80, 0x40, 0x2, 0x8a2e}}) 16:38:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4000c0, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x800}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 16:38:10 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x15, 0x100, 0x70bd26, 0x25dfdbff, {0x2c, 0xff}, [@INET_DIAG_REQ_BYTECODE={0x95, 0x1, "04c9716ec46cf48e083fd08641f9a46ccb61aadf155840122a0e23552b4b48843eb04fa0291bbdc122a933a1a6c2a86fa9486a6ca4ac7dd1408fe08d6c7d1e4f1fa4038980adb9eca21392aab985ff1e92e98372b1fdfcf7a334c1128281ced9fb06e07228bac7bfc03bee1ec80c6cdd5d9f962bea14ce477b7ee886c95d99574710708ad07b93c9f2ed65054609f52624"}]}, 0xac}}, 0x0) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socketpair(0x15, 0xa, 0x409fdf43, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 16:38:10 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:10 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000980)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r0, 0xfffffffffffffffd, 0x2, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="516e12ca421419c14e32fd898e80cdfbbe1ac7e82ab8e5c38a95bc40b4166fd0a97c0aa3a3d3ffb06df81cfc9f9037de4e9021969144aec9e3fdb367e4bfa4bb6842aee5ebe3d46e218d1ea72b352ccc75880b2d572d879c067a8a9b2ae0eaa3a5b3156739f406547828048f7e2808fc9b3a11d3e8f175c224c2529ed5f60ab6e3d37546", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf250100000008000b004e00000006001d000700000006001b004e21000047c54199e97486610000000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40040}, 0x4049080) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x700, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:10 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x4000}) 16:38:10 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x7, 0x1}}) 16:38:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x0, 0x1}}) 16:38:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:10 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000000)) 16:38:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}) 16:38:11 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r1) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x1, 0x9, 0x301, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3f}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4014}, 0x80) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x100) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x700, 0x8, 0x3f, 0x1f, {{0x17, 0x4, 0x3, 0x9, 0x5c, 0x65, 0x0, 0xff, 0x29, 0x0, @private=0xa010102, @private=0xa010101, {[@noop, @rr={0x7, 0xb, 0xa2, [@private=0xa010101, @multicast2]}, @noop, @cipso={0x86, 0x16, 0x3, [{0x0, 0xa, "b4cd6e630417a20f"}, {0x2, 0x6, "622e2ace"}]}, @timestamp={0x44, 0x24, 0xf3, 0x0, 0xa, [0x5, 0x9, 0x8e, 0x6, 0xfff, 0x5, 0x2, 0x11f6]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', r2, 0x29, 0x0, 0x1f, 0x8, 0x22, @empty, @private0, 0x700, 0x701, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6gre0\x00', r2, 0x2f, 0x80, 0x1f, 0x8, 0xa, @private0, @private1, 0x7808, 0x7, 0x0, 0xeccf}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$HIDIOCGPHYS(r3, 0x80404812, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x8904, &(0x7f0000000000)) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'gre0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x8, 0x1, 0x8, 0x1a, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x700, 0x1, 0x7f, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', r3, 0x7800, 0x1, 0x8b1, 0x647, {{0x13, 0x4, 0x1, 0x0, 0x4c, 0x66, 0x0, 0x1, 0x29, 0x0, @private=0xa010101, @multicast2, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x70, 0x0, 0x8, [0x101, 0x200, 0x0]}, @timestamp_addr={0x44, 0x14, 0xc, 0x1, 0x6, [{@empty, 0xfffffeff}, {@broadcast, 0x80}]}, @timestamp_prespec={0x44, 0xc, 0x4, 0x3, 0x0, [{@multicast1, 0x6}]}]}}}}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r5, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x0, 0x19, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_DPORT={0x0, 0x1b, 0x4e22}, @L2TP_ATTR_IP_SADDR={0xfffffffffffffca3, 0x18, @multicast1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4048814) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:11 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0xa6c83) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00', r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8000}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001540), 0x4) 16:38:11 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0xc4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x490880, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000017c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000200)="0f03e57ee5892e6d92c44cb4818987e8", 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0xb3, 0x7, 0x5, 0x21, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8, 0x8000, 0x5, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6_vti0\x00', r4, 0x0, 0x3, 0x7f, 0x3, 0x43, @private0={0xfc, 0x0, [], 0x1}, @private0={0xfc, 0x0, [], 0x1}, 0x40, 0x8000, 0x10001, 0xff}}) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) 16:38:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:11 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x700, 0x7, 0x1}}) 16:38:11 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="8f6094ff825a1930b51489e6f45c3055e6381c59dc8ea4b7f3008c49a3cf9c005528a9dfb0555fad577fc8af628cda3603136cd522d4764a81eaacc1e8921a7e81f9433136058aa7417bb49621649451cfc9df5acc1c2967", &(0x7f0000000080)=@tcp=r1, 0x7}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x7, 0x1}}) 16:38:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x0, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x83d}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_TRIM(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x100, 0x70bd2b, 0x25dfdbfd, "", [""]}, 0x10}}, 0x4000090) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x0, 0x1}}) 16:38:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}) 16:38:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x4, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) 16:38:12 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x9, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x2, 0x28, 0x8000, 0x2b, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:12 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000007c0)={'syztnl2\x00', &(0x7f0000000740)={'sit0\x00', r2, 0x29, 0x0, 0x2, 0xb0, 0x32, @private0={0xfc, 0x0, [], 0x1}, @mcast1, 0x7, 0x8000, 0x6, 0x101}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:12 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x40000) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000300)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, 0x3, 0x8, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x22eb}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44004}, 0x4c040) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x800}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x20044000}, 0x1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$SO_J1939_SEND_PRIO(r3, 0x6b, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000007c0)={'syztnl2\x00', &(0x7f0000000740)={'sit0\x00', r2, 0x29, 0x0, 0x2, 0xb0, 0x32, @private0={0xfc, 0x0, [], 0x1}, @mcast1, 0x7, 0x8000, 0x6, 0x101}}) 16:38:12 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x18, 0x5, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01012dbd7000fedbdf2e0200000014002000fe8000000000000000000000000000bb0800190064010102050006008000000006000300090000000500060005000000050022000000000014001f000000000000000000000000000000000106001c00090000000500050000000000"], 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x583000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f00000001c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20000080) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:12 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r2 = socket(0x1e, 0x80000, 0x4) socket$l2tp6(0xa, 0x2, 0x73) socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(r2, &(0x7f0000000680)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)=""/179, 0xb3}, {&(0x7f00000001c0)=""/81, 0x51}, {&(0x7f00000002c0)=""/112, 0x70}, {&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000340)=""/153, 0x99}, {&(0x7f0000000400)=""/85, 0x55}, {&(0x7f0000000480)=""/152, 0x98}], 0x7, &(0x7f00000005c0)=""/155, 0x9b}, 0x40002042) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8904, &(0x7f0000000280)) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000007c0)={'syztnl2\x00', &(0x7f0000000740)={'sit0\x00', r2, 0x29, 0x0, 0x2, 0xb0, 0x32, @private0={0xfc, 0x0, [], 0x1}, @mcast1, 0x7, 0x8000, 0x6, 0x101}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:12 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x9, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xfe, 0x80, [], 0x40}, 0x1, 0x700, 0x7, 0x1}}) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1, 0x8000, 0x7, 0x0, 0x40000006}}) 16:38:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1, 0x0, 0x7, 0x0, 0x40000006}}) 16:38:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1, 0x0, 0x0, 0x0, 0x40000006}}) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:13 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xa1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x18}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x36}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:13 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xa1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x18}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x36}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:13 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x11, 0xa, 0xffff7fff) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r2, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xa1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x18}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x36}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:13 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x1, 0x700, 0x7, 0x1}}) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r1, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r1, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xa1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x18}}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x36}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x700, 0x7, 0x1}}) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1200000000ff07f1ff10", @ANYRES16=r1, @ANYBLOB="010025bd7000fedbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000081) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x7, 0x1}}) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev, 0x0, 0x0, 0x0, 0x1}}) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', 0x0}) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', 0x0}) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x11, 0xa, 0xffff7fff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:13 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', 0x0}) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x0, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x0, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 0: r0 = socket(0x11, 0xa, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x0, 0x6, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x0, 0xa, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x3, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x0, 0xa, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x100, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x2f, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x0, 0xa, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private=0xa010100}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x11, 0x0, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private}, 0x20, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x11, 0x0, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 0: r0 = socket(0x11, 0x0, 0xffff7fff) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private}, 0x0, 0x20, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private}, 0x0, 0x0, 0x800, 0x2}}) 16:38:14 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private}, 0x0, 0x0, 0x0, 0x2}}) 16:38:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:14 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @private}}}) 16:38:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 0: socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:15 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:15 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:15 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:38:15 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:15 executing program 3: r0 = socket(0x0, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:15 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8906, 0x0) 16:38:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 4: r0 = bpf$PROG_LOAD(0x11, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004d740)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004d940)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004db40)={0x6ac4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xff, "2c03a1b7bd725d"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004eb40)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ed40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ef40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004f140)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x40, "7af031be0a1fc6"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000050140)={0x1f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "2a0c18e03b92ba"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051140)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "c19f2cdf95ce73"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000052140)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052340)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}, {}, {r3}, {}, {r4}, {}, {0x0, r5}, {0x0, r6}, {}, {}, {0x0, r7}, {0x0, r8}, {0x0, r9}, {0x0, r10}], 0x2, "953fe079b1f9ac"}) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r13, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3, 0x8001, 0x5, 0x10, r12, 0x0, [], 0x0, r13, 0x1, 0x4, 0x4}, 0x40) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r12, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r12, 0x5411, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r11, 0x8907, 0x0) 16:38:16 executing program 3: r0 = socket(0x11, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x4, 0xffff, 0x40, @mcast2, @mcast1, 0x8, 0x7, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddr={0x40, 0x14, 0x8, 0x70bd28, 0x25dfdbfd, {0xa, 0x8, 0xc2, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x400, 0x90, 0x3, 0xfffffffe}}]}, 0x40}, 0x1, 0x0, 0x0, 0x50004}, 0x40) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x4, 0xffff, 0x40, @mcast2, @mcast1, 0x8, 0x7, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddr={0x40, 0x14, 0x8, 0x70bd28, 0x25dfdbfd, {0xa, 0x8, 0xc2, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x400, 0x90, 0x3, 0xfffffffe}}]}, 0x40}, 0x1, 0x0, 0x0, 0x50004}, 0x40) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x303}, "28454ee634064b57", "cec6ab602ea84567f62bfce3745f77b8", "75bef0ec", "eb6e8f9ded9387e0"}, 0x28) 16:38:16 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x4, 0xffff, 0x40, @mcast2, @mcast1, 0x8, 0x7, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv6_newaddr={0x40, 0x14, 0x8, 0x70bd28, 0x25dfdbfd, {0xa, 0x8, 0xc2, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x400, 0x90, 0x3, 0xfffffffe}}]}, 0x40}, 0x1, 0x0, 0x0, 0x50004}, 0x40) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x4, 0xffff, 0x40, @mcast2, @mcast1, 0x8, 0x7, 0x80000001, 0x2}}) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x0, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f6, 0x10, 0x70bd2c, 0x25dfdbff, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x2801}, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 0: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0xc0000) 16:38:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 16:38:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 0: syz_open_dev$video4linux(0x0, 0xf2d, 0xc0000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x80d1}, 0x20000014) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25010000000c000f00db3500000000000008000c000300000008000b00040000000600030009000000080019000a0101020500210003000000"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x90) 16:38:16 executing program 0: syz_open_dev$video4linux(0x0, 0xf2d, 0xc0000) 16:38:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x60, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x80d1}, 0x20000014) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25010000000c000f00db3500000000000008000c000300000008000b00040000000600030009000000080019000a0101020500210003000000"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x90) 16:38:16 executing program 0: syz_open_dev$video4linux(0x0, 0xf2d, 0xc0000) 16:38:16 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'rose0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x80d1}, 0x20000014) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25010000000c000f00db3500000000000008000c000300000008000b00040000000600030009000000080019000a0101020500210003000000"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x90) 16:38:16 executing program 0: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0xc0000) 16:38:16 executing program 2: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x20, 0x0, 0xa372, 0x0, {{0xe, 0x4, 0x0, 0x5, 0x38, 0x65, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, {[@noop, @timestamp_prespec={0x44, 0x14, 0x2c, 0x3, 0x4, [{@dev={0xac, 0x14, 0x14, 0x3a}, 0x800}, {@broadcast, 0x64}]}, @noop, @end, @lsrr={0x83, 0x7, 0x18, [@multicast1]}, @ra={0x94, 0x4}]}}}}}) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="5b55db05f796b326f1d9897522c865c6ee7c2f94d9ef28d58dccda3a099f2a4338cd9f7404e6d224f790741248f7e5e7264bd0f86fa3682844e84f6865d3418b2fe7ec3b9339a7746f8dccf90bb5ff912ba509d5255e08000542a456d36a986ba0c3a5bc3f01d7a843b6a6a0922a72a72290d89127d68e75fa9cecec013a747475d7a98edd90cf672a0f5e7c4d06eec70b380cf5b9fd333753db1420eee3b2d112ae221c10e703cea423f6f543dc5bc9cec2c77e62c3053fe041f2be399a36e49bf232a77cef68f59e7fbfab80d94ff1423755", @ANYRES16=0x0, @ANYBLOB="000827bd7000fddbdf250000000005000d000100000005000600ff00000006000200010000001400080076657468315f746f5f7465616d000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x15, 0x7, 0x26, 0x1f, 0x86, r2, 0x4, [], r0, r1, 0x5, 0x2, 0x3}, 0x40) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000063580)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "03d7f747c06c96"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000064580)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064780)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x53, "a6857963b208f0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000065780)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000065980)={0x104, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "37df4a657dd02a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000066980)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000066b80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000066d80)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x5, "93474525707295"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000067d80)={0x1, [{0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x4, "6af3838158b9d7"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000068d80)={0x101, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "a6ca3a7ab23d26"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000069d80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r10}, {}, {r11, r12}, {0x0, r13}, {}, {r14}, {}, {r15}, {}, {r16}, {}, {r17}], 0x4, "bef338330a65dc"}) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x8906, 0x0) 16:38:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3ff}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 0: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0xc0000) 16:38:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x2, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x80d1}, 0x20000014) 16:38:17 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 0: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0xc0000) 16:38:17 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvlan0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008880) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x80040, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x8906, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e21, @multicast2}}, 0x0, 0x0, 0x37, 0x0, "090269a045a4f3ca09e210531f13815f82c0e89fc03914d11d30b073029c795836c4b67f57b886a90c5f94986ee6c8dbb0cd94fdc86b1dd5a81c7e802226e0e2b9cf107d16107a9f985bb4bfb324a8fc"}, 0xd8) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="34000000010a010200000000000000000c0000060c0004400000000000004671160bd130c44e69495f1a1128a635a2f56597f50671c42e43e2ebbc39cfbf21f20cfcbbba19ec8100050800024000"], 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 16:38:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x6800c0, 0x0) 16:38:17 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r2, 0x200, 0xfffffffe, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x100}, 0x40804) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x3c}}, 0x800) 16:38:17 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 0: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xf2d, 0x0) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040)="e1befcad14a1155c44a5815b3ac7c70bc59085a9930d4bfb6aeb0312f6c72b99d73b645573f69877470af17a25aa94d091aa37e5ef07653d80ddd3f53cc5c16517a9301120968aa0681133eb4a63dadb5b4c9bf86b62fda8", &(0x7f00000000c0)=@tcp6=r1}, 0x20) 16:38:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, 0x0, 0x4000000) 16:38:17 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040)="e1befcad14a1155c44a5815b3ac7c70bc59085a9930d4bfb6aeb0312f6c72b99d73b645573f69877470af17a25aa94d091aa37e5ef07653d80ddd3f53cc5c16517a9301120968aa0681133eb4a63dadb5b4c9bf86b62fda8", &(0x7f00000000c0)=@tcp6=r1}, 0x20) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, 0x0, 0x4000000) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040)="e1befcad14a1155c44a5815b3ac7c70bc59085a9930d4bfb6aeb0312f6c72b99d73b645573f69877470af17a25aa94d091aa37e5ef07653d80ddd3f53cc5c16517a9301120968aa0681133eb4a63dadb5b4c9bf86b62fda8", &(0x7f00000000c0)=@tcp6=r1}, 0x20) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, 0x0, 0x4000000) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) 16:38:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:17 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}]}, 0x28}}, 0x20044080) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) 16:38:17 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}]}, 0x28}}, 0x0) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:17 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:17 executing program 2: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:17 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x4, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:17 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:17 executing program 2: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:18 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:18 executing program 2: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3fb, 0x400, 0x70bd2d, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:18 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', 0x0}) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', 0x0}) 16:38:18 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', 0x0}) 16:38:18 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x1, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={0x0}}, 0x4000000) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48f43493dcaf91f9}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x7f, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:38:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) clock_gettime(0x1, &(0x7f0000000080)) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x4, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000180)) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:38:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) clock_gettime(0x1, &(0x7f0000000080)) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 16:38:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) clock_gettime(0x1, &(0x7f0000000080)) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0xff, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev={0xfe, 0x80, [], 0x1c}, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 16:38:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005dac0)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x40, "3c4948c266cb4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005eac0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x9, "0037824ba2cac5"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005fac0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f000005fcc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005fec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000600c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "f039b9d5ca01f6"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000610c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000614c0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x6, "7b01a9c03cf2b7"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000624c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000626c0)={0x401, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "a654166957c2e0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000636c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000638c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063ac0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {r6}, {}, {}, {r7, r8}, {}, {}, {0x0, r9}, {0x0, r10}, {}, {r11}, {0x0, r12}, {r13}, {}, {}, {r14}, {}, {}, {0x0, r15}, {r16}, {0x0, r17}], 0x6, "d3b350e2d9f690"}) r18 = socket$nl_generic(0x10, 0x3, 0x10) r19 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r18, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000e7132deec876e907c4cfa9ec030016b8fc864b8619ebcb55f6045848e8aa79b5db79cc30cf188b4516bc77d431a9d819d765fe176a6314799156f6e2753e8f459d5234fd64fce931247eb1916f6c34d88d5b788170cc860de440d47a1ef619d61872364603f195c2", @ANYRES16=r19, @ANYBLOB="00082dbd7000fddbdf25070000000c001000dd11000000000000080009000400daf3634ff7591313b18f44343ea81931a4847d4e7a150dde9f8a479fc701cbdfb53be844fbae9bfd02bebfe1e8ca32ca4ec1ce5c2dce06ef91bea97290412774be9f2fd8c8550ba0aafb9d49382912efddc26e6286ac697a15a9f89cad37f1771b600ca669702638f6aa16a12cd830ad3fac631e2d51f6d78a6f1034d2010c5a5c1a4224aa821e28d72b713a3c407ce7930a34a28ceec457350922cb2888ff97b40be1aa340c10424c6efef81370"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000804) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x7, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev, 0x700, 0x1, 0x4, 0x1}}) 16:38:18 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clock_gettime(0x5, &(0x7f0000000000)) 16:38:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 16:38:18 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x5, &(0x7f0000000000)) 16:38:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x6, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x561040, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vim2m\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x8, 0x7, 0x4, 0x1000, 0xffffffff, {r2, r3/1000+60000}, {0x4, 0x8, 0x2, 0x6, 0x0, 0x9, "45a68160"}, 0xbe27, 0x3, @offset=0x6, 0x8}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev, 0x0, 0x1, 0x4, 0x1}}) 16:38:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x4, 0x0, 0x8, 0x9, 0x44, @local, @ipv4={[], [], @multicast1}, 0x8000, 0x8000, 0x2, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'ip6_vti0\x00', r2, 0x29, 0x4, 0x6, 0x4, 0x10, @rand_addr=' \x01\x00', @mcast1, 0x8, 0x7800, 0xffffffff, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="28808b401e4cd5822fcc149396f8716aea8f2abfaef0701d0437f713d17b0453f022c2574c4afaff766fc1cfebf996e637362c6728f626a9c337f0d5bde7628e2259564ee38b31a9182f847965d9cc7c768a3a17da74ac77f1a855188a82c69b69fc3be7bed9b413d2043d8c8902c330e2a556f432064d2e07a6051c030442a0cbf40522a6", @ANYRES16=0x0, @ANYBLOB="02002dbd7000fedbdf250700000006001a004e2000000c0010000000010000000000"], 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x11) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3fb, 0x4, 0x70bd28, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:19 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 4: clock_gettime(0x5, &(0x7f0000000000)) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev, 0x0, 0x0, 0x4, 0x1}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x80000001, 0x2, {{0x13, 0x4, 0x1, 0x7, 0x4c, 0x65, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0x8, 0xef, 0x0, 0x4, [0x0]}, @ssrr={0x89, 0xb, 0x40, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @cipso={0x86, 0x23, 0x3, [{0x1, 0x12, "2c43f32ceff8ba76587adb3d9d3437da"}, {0x0, 0x6, "cd0de3c6"}, {0x0, 0x5, "f0d350"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', r4, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="9893b93d1dc275ffb1dc946d4882ad13859f5f30ff0524074a565fd97c5d5f012fa9a1666a0031331f1fce6e13869cf57c6f51d2b8f34f26c662e53b696737391aa36f50", &(0x7f00000000c0)=@udp, 0x4}, 0x20) 16:38:19 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0, 0x10, 0x40, 0x8000, 0x5}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev, 0x0, 0x0, 0x0, 0x1}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x80000001, 0x2, {{0x13, 0x4, 0x1, 0x7, 0x4c, 0x65, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0x8, 0xef, 0x0, 0x4, [0x0]}, @ssrr={0x89, 0xb, 0x40, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @cipso={0x86, 0x23, 0x3, [{0x1, 0x12, "2c43f32ceff8ba76587adb3d9d3437da"}, {0x0, 0x6, "cd0de3c6"}, {0x0, 0x5, "f0d350"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', r4, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="9893b93d1dc275ffb1dc946d4882ad13859f5f30ff0524074a565fd97c5d5f012fa9a1666a0031331f1fce6e13869cf57c6f51d2b8f34f26c662e53b696737391aa36f50", &(0x7f00000000c0)=@udp, 0x4}, 0x20) 16:38:19 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0, 0x0, 0x40, 0x8000, 0x5}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @dev}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x80000001, 0x2, {{0x13, 0x4, 0x1, 0x7, 0x4c, 0x65, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0x8, 0xef, 0x0, 0x4, [0x0]}, @ssrr={0x89, 0xb, 0x40, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @cipso={0x86, 0x23, 0x3, [{0x1, 0x12, "2c43f32ceff8ba76587adb3d9d3437da"}, {0x0, 0x6, "cd0de3c6"}, {0x0, 0x5, "f0d350"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', r4, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="9893b93d1dc275ffb1dc946d4882ad13859f5f30ff0524074a565fd97c5d5f012fa9a1666a0031331f1fce6e13869cf57c6f51d2b8f34f26c662e53b696737391aa36f50", &(0x7f00000000c0)=@udp, 0x4}, 0x20) 16:38:19 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0, 0x0, 0x0, 0x8000, 0x5}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0x80000001, 0x2, {{0x13, 0x4, 0x1, 0x7, 0x4c, 0x65, 0x0, 0x8, 0x4, 0x0, @remote, @multicast1, {[@timestamp={0x44, 0x8, 0xef, 0x0, 0x4, [0x0]}, @ssrr={0x89, 0xb, 0x40, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @cipso={0x86, 0x23, 0x3, [{0x1, 0x12, "2c43f32ceff8ba76587adb3d9d3437da"}, {0x0, 0x6, "cd0de3c6"}, {0x0, 0x5, "f0d350"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', r4, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x20044080) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000002c0)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0, 0x0, 0x0, 0x0, 0x5}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x101, 0x100) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 4: clock_gettime(0x5, 0x0) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0}}) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x881, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 4: clock_gettime(0x5, 0x0) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9c9a}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9c9a}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 4: clock_gettime(0x5, 0x0) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000017c0)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x9c9a}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x2, 0xa, 0xffff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x2, 0xa, 0xffff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x104c0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6228a2, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x2, 0xa, 0xffff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:19 executing program 3: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:19 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:19 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x2, 0xa, 0xffff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'sit0\x00', r1, 0x4, 0x3, 0x0, 0xfffffffc, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x700, 0x200, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 3: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x2, 0xa, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:20 executing program 3: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x400}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044080) 16:38:20 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080780000000002000000014a0500a80064000006049078e00000010a010102940401008626ffffffff050700b90a901204111a71e26c698788ccff4a627446a9800608353f1daa0e88830bf9ac1414aa00000000443c8251ac14141010bd188e6401010000000007e000000200000000ac1e010100000006ac14143600000002e0000002000000017f0000010000000044203c7000000004000000040001000000000003000000010000000400000002000000"]}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:20 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x20044080) 16:38:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:20 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000402}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x8916, 0x0) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:20 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 4: r0 = socket(0x2, 0xa, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 16:38:20 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x8916, 0x0) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x81, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 4: r0 = socket(0x0, 0xa, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', 0x0}) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x8916, 0x0) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', 0x0}) 16:38:20 executing program 4: r0 = socket(0x0, 0xa, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 4: r0 = socket(0x0, 0xa, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', 0x0}) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x2, 0x1, 0x32, 0x1b, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x700, 0x7, 0x8, 0x2}}) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 4: r0 = socket(0x2, 0x0, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x700, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x8}}, 0x20) 16:38:20 executing program 4: r0 = socket(0x2, 0x0, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x8, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0xfffffffd, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 4: r0 = socket(0x2, 0x0, 0xffff) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x3, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000540)={'sit0\x00', 0x0}) 16:38:20 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:20 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000300)={0x7ff, 0x1b9, 0x5}) 16:38:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0xc, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x0, 0x40, 0x8, 0x9}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x66, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x0, 0x0, 0x8, 0x9}}) 16:38:21 executing program 4: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x81, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={0x0, 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x0, 0x0, 0x0, 0x9}}) 16:38:21 executing program 4: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r2) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="000225bd7000fedbdf25060000000c0003001f000000000000000c00160027270000000000000c000f00ff7f0000000002000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x8004) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={0x0, 0x44}}, 0x44) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', r1) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2={0xfc, 0x2, [], 0x1}, @mcast1}}) 16:38:21 executing program 4: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={0x0, 0x44}}, 0x0) 16:38:21 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x25}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3fb, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x32}, @local, 0x7800, 0x0, 0x1ff, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', r1, 0x4, 0x7, 0x8, 0x4, 0xc3, @mcast1, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x40, 0x0, 0x9}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:38:21 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end, @end]}}}}}) 16:38:21 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}, @end]}}}}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3fb, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x32}, @local, 0x7800, 0x0, 0x1ff, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', r1, 0x4, 0x7, 0x8, 0x4, 0xc3, @mcast1, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x40, 0x0, 0x9}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 2: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}, @lsrr={0x83, 0x1f, 0xb0, [@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x10}]}]}}}}}) 16:38:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3fb, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x4, 0x3, 0x8, 0x0, @dev={0xfe, 0x80, [], 0x32}, @local, 0x7800, 0x0, 0x1ff, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'syztnl1\x00', r1, 0x4, 0x7, 0x8, 0x4, 0xc3, @mcast1, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x40, 0x0, 0x9}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000017c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x10, 0x40, 0x8, 0x9}}) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:21 executing program 2: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @timestamp={0x44, 0x1c, 0xa5, 0x0, 0x5, [0x5, 0x13558000, 0x478b, 0xfffff800, 0x53, 0x0]}]}}}}}) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 1: socketpair(0x1e, 0x5, 0x3, &(0x7f0000000000)) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end]}}}}}) 16:38:21 executing program 2: sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:38:21 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:21 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:21 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0xf, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x4004090) 16:38:21 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:21 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', 0x0}) 16:38:22 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRES32], 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0xf, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x4004090) 16:38:22 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x20000040) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x40, 0x8, 0x9}}) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0xf, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x4004090) 16:38:22 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 16:38:22 executing program 3: r0 = socket(0x0, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x0, 0x8, 0x9}}) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x0) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x0) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x0, 0x0, 0x9}}) 16:38:22 executing program 3: r0 = socket(0x0, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, 0x0, 0x44) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:22 executing program 3: r0 = socket(0x0, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x0) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r7, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}}, 0x40000c0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x20, 0x1, 0x8c, 0x200, {{0x16, 0x4, 0x2, 0x2, 0x58, 0x67, 0x0, 0x1, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@end, @timestamp_addr={0x44, 0xc, 0x41, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0xe}, 0xc8}]}, @timestamp={0x44, 0x20, 0x7b, 0x0, 0x3, [0x6, 0x5d2, 0x6, 0x7a4e, 0x9, 0x7, 0xab]}, @timestamp_addr={0x44, 0x14, 0xce, 0x1, 0x7, [{@multicast2, 0x9}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x2}]}, @noop]}}}}}) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000180)) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x80) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 3: r0 = socket(0x2, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r7, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}}, 0x40000c0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x20, 0x1, 0x8c, 0x200, {{0x16, 0x4, 0x2, 0x2, 0x58, 0x67, 0x0, 0x1, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@end, @timestamp_addr={0x44, 0xc, 0x41, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0xe}, 0xc8}]}, @timestamp={0x44, 0x20, 0x7b, 0x0, 0x3, [0x6, 0x5d2, 0x6, 0x7a4e, 0x9, 0x7, 0xab]}, @timestamp_addr={0x44, 0x14, 0xce, 0x1, 0x7, [{@multicast2, 0x9}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x2}]}, @noop]}}}}}) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) socketpair(0x10, 0x1, 0x2, &(0x7f0000000100)) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:22 executing program 3: r0 = socket(0x2, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x80) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r7, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}}, 0x40000c0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'tunl0\x00', 0x0, 0x20, 0x1, 0x8c, 0x200, {{0x16, 0x4, 0x2, 0x2, 0x58, 0x67, 0x0, 0x1, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@end, @timestamp_addr={0x44, 0xc, 0x41, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0xe}, 0xc8}]}, @timestamp={0x44, 0x20, 0x7b, 0x0, 0x3, [0x6, 0x5d2, 0x6, 0x7a4e, 0x9, 0x7, 0xab]}, @timestamp_addr={0x44, 0x14, 0xce, 0x1, 0x7, [{@multicast2, 0x9}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x2}]}, @noop]}}}}}) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x381882, 0x0) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}, 0x1, 0x0, 0x0, 0xe7936f02525e6958}, 0x44) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x8142, 0x0) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 3: r0 = socket(0x2, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}}, 0x44) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r7, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}}, 0x40000c0) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 3: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x44}}, 0x0) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:22 executing program 4: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:22 executing program 3: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x40, 0x1, 0x60, @remote, @mcast1, 0x10, 0x40, 0x513b93b4, 0x7fffffff}}) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa0440, 0x0) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) 16:38:22 executing program 4: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:22 executing program 3: socket(0x2, 0xa, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x40, 0x13, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4212}, [@IFLA_TXQLEN={0x8, 0xd, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x3a60}, @IFLA_LINKMODE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) 16:38:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x40, 0x1, 0x60, @remote, @mcast1, 0x10, 0x40, 0x513b93b4, 0x7fffffff}}) 16:38:22 executing program 4: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) 16:38:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4c802}, 0x8000) 16:38:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:23 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x40, 0x1, 0x60, @remote, @mcast1, 0x10, 0x40, 0x513b93b4, 0x7fffffff}}) 16:38:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r4 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r4, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r5}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:23 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, 0x0, 0x20000040) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 16:38:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, 0x0) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000002000/0x4000)=nil, 0x4000}}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r2 = socket(0x18, 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x4, 0xa8, 0x34, 0x2, 0x10, @remote, @private0={0xfc, 0x0, [], 0x1}, 0x80, 0x17800, 0xcae2, 0x6}}) sendmsg$nl_route(r2, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x2f, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xffffffffffffff32, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000002000/0x4000)=nil, 0x4000}}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) r1 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r1, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}]}, 0x30}}, 0x0) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000002000/0x4000)=nil, 0x4000}}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}]}, 0x30}}, 0x0) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000002000/0x4000)=nil, 0x4000}}) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}]}, 0x30}}, 0x0) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000040) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r1, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x24}}, 0x0) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r1, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x24}}, 0x0) 16:38:23 executing program 3: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, 0x0) r1 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r1, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x24}}, 0x0) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0xf0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x30}}, 0x0) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x8, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 0: r0 = socket(0x0, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x30}}, 0x0) 16:38:23 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:23 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x30}}, 0x0) 16:38:23 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:23 executing program 0: r0 = socket(0x0, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:24 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:38:24 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioprio_get$uid(0x0, 0xee01) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000600000008000a000000fc2028bf08006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0xb74328fd15963cd4}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 0: r0 = socket(0x0, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x80, 0x700, 0x1, 0xb5f}}) 16:38:24 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)) 16:38:24 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2, 0x80, 0x700, 0x1, 0xb5f}}) [ 3187.324026][T22494] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioprio_get$uid(0x0, 0xee01) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000600000008000a000000fc2028bf08006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0xb74328fd15963cd4}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 0: r0 = socket(0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r4, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="d57439191d8db341997bb099f3ad5b73d08a99f59f3d80317780580be0b03e80fef550c19c4d7c3e8535f9aee6971fc83cf50ad44e2dbd786d58d82ae0a2d086e4c352e2f84fea463e34b2b92199064e604f48001d451f2975541aae3028d7e5e2216ac9121993dad8b9d815adfe35df2d994631d6c34246aa9749f4995a2bb3a464955613b0c85b05994fac6255f3fa387a3998c9e43f5417fc0d0d6bcbc770e10d7b3f8c", &(0x7f0000000140)=@udp=r2, 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2, 0x0, 0x700, 0x1, 0xb5f}}) 16:38:24 executing program 0: r0 = socket(0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) [ 3187.435639][T22511] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 16:38:24 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2, 0x0, 0x0, 0x1, 0xb5f}}) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r4, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="d57439191d8db341997bb099f3ad5b73d08a99f59f3d80317780580be0b03e80fef550c19c4d7c3e8535f9aee6971fc83cf50ad44e2dbd786d58d82ae0a2d086e4c352e2f84fea463e34b2b92199064e604f48001d451f2975541aae3028d7e5e2216ac9121993dad8b9d815adfe35df2d994631d6c34246aa9749f4995a2bb3a464955613b0c85b05994fac6255f3fa387a3998c9e43f5417fc0d0d6bcbc770e10d7b3f8c", &(0x7f0000000140)=@udp=r2, 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) 16:38:24 executing program 0: r0 = socket(0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 0: socket(0x18, 0x800, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r4, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000040)="d57439191d8db341997bb099f3ad5b73d08a99f59f3d80317780580be0b03e80fef550c19c4d7c3e8535f9aee6971fc83cf50ad44e2dbd786d58d82ae0a2d086e4c352e2f84fea463e34b2b92199064e604f48001d451f2975541aae3028d7e5e2216ac9121993dad8b9d815adfe35df2d994631d6c34246aa9749f4995a2bb3a464955613b0c85b05994fac6255f3fa387a3998c9e43f5417fc0d0d6bcbc770e10d7b3f8c", &(0x7f0000000140)=@udp=r2, 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, 0x0) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2, 0x0, 0x0, 0x0, 0xb5f}}) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 0: socket(0x18, 0x800, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r3, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2}}) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r2, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 0: socket(0x18, 0x800, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x6, 0x1, 0x5, 0x2, 0x10, @empty, @rand_addr=' \x01\x00', 0x40, 0x1, 0x0, 0x1f}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r2, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:24 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, 0x0, 0x4001) 16:38:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x6, 0x1, 0x5, 0x2, 0x10, @empty, @rand_addr=' \x01\x00', 0x40, 0x1, 0x0, 0x1f}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="38000000d2ff6197886214ec0076b7305ad9c9b62ac4b5b7505f86375a872b36b94f22b57006f6721b888f933b584c01dfc79df36d173d276f50a56485783a64610fdb6c2b379db8d2d8f501931fd844b9101dd63cb3e751ae398e1c5e2a80a08184e6a82215fbf3f7992cef4b3166bf5a96d3bb062c8c866b466c62", @ANYRES16=r2, @ANYBLOB="0100000000000000000006000000050014000100000014000800627269646765300000000000000000000600010005000000"], 0x38}}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, 0x0, 0x4001) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:24 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x6, 0x1, 0x5, 0x2, 0x10, @empty, @rand_addr=' \x01\x00', 0x40, 0x1, 0x0, 0x1f}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, 0x0) 16:38:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, 0x0, 0x4001) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:24 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)=@ipv4_newroute={0x50, 0x18, 0x800, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x20, 0x0, 0x0, 0x6, 0xfd, 0x0, 0x200}, [@RTA_UID={0x8}, @RTA_SRC={0x8, 0x2, @private=0xa010100}, @RTA_MARK={0x8, 0x10, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x8}}, @RTA_OIF={0x8}, @RTA_IIF={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:24 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x6, 0x1, 0x5, 0x2, 0x10, @empty, @rand_addr=' \x01\x00', 0x40, 0x1, 0x0, 0x1f}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:24 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r1, 0x6, 0x1, 0x5, 0x2, 0x10, @empty, @rand_addr=' \x01\x00', 0x40, 0x1, 0x0, 0x1f}}) 16:38:24 executing program 3: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:25 executing program 5: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x107000, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:25 executing program 4: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:25 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:25 executing program 1: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 4: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x6, 0xd10, 0x6e, @loopback, @rand_addr=' \x01\x00', 0x80, 0x1, 0x4, 0x705}}) 16:38:25 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}, 0x1, 0x0, 0x0, 0x4804}, 0x4001) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:25 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 4: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x4001) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, 0x0) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:25 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x23000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, 0x0) 16:38:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 2: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 0: r0 = socket(0x18, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, 0x0, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:38:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8912, 0x0) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, 0x0, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x20, 0x515a, 0x41, @remote, @dev={0xfe, 0x80, [], 0x24}, 0x7, 0x7, 0x8, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x20, 0x515a, 0x41, @remote, @dev={0xfe, 0x80, [], 0x24}, 0x7, 0x7, 0x8, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, 0x0, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x88f5, 0x5, &(0x7f00000002c0)=0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, 0x13, 0x400, 0x70bd26, 0x25dfdbfc, {0x2a, 0xff, 0x7f, 0x8, {0x4e1f, 0x4e21, [0x9, 0x2, 0x7fffffff, 0x401], [0x80001, 0x8000, 0x4, 0xfffff195], 0x0, [0x1, 0x8]}, 0x7, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xc5, 0x1, "f59d68b3ef93658ebf6baf5acba85e897ac6fd9c8e3d34291c42500772c44eb9ff7f011b56afd6b15dc97f3559527c67ed55cb05baeea6c493f593d83330fc57acbddae3f88ba965f4640e9ebea4008c7dd9886c4a4de8b832e6ee7e6d5dab018eb66649dd39059bacd8c25e32fe85982aafef1e7b94cc46180ec61839ab4bb643f181c674150deab5b78d8295a88674b7a787bae35ab20c37a12ee47f2fce78dbc8c30472edb91b304cd0a122d044ab695d292b6d27fd6868df013a8619f907f2"}]}, 0x114}, 0x1, 0x0, 0x0, 0x517227efa896c1e7}, 0x4040055) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x88f5, 0x5, &(0x7f00000002c0)=0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, 0x13, 0x400, 0x70bd26, 0x25dfdbfc, {0x2a, 0xff, 0x7f, 0x8, {0x4e1f, 0x4e21, [0x9, 0x2, 0x7fffffff, 0x401], [0x80001, 0x8000, 0x4, 0xfffff195], 0x0, [0x1, 0x8]}, 0x7, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xc5, 0x1, "f59d68b3ef93658ebf6baf5acba85e897ac6fd9c8e3d34291c42500772c44eb9ff7f011b56afd6b15dc97f3559527c67ed55cb05baeea6c493f593d83330fc57acbddae3f88ba965f4640e9ebea4008c7dd9886c4a4de8b832e6ee7e6d5dab018eb66649dd39059bacd8c25e32fe85982aafef1e7b94cc46180ec61839ab4bb643f181c674150deab5b78d8295a88674b7a787bae35ab20c37a12ee47f2fce78dbc8c30472edb91b304cd0a122d044ab695d292b6d27fd6868df013a8619f907f2"}]}, 0x114}, 0x1, 0x0, 0x0, 0x517227efa896c1e7}, 0x4040055) 16:38:25 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x20, 0x515a, 0x41, @remote, @dev={0xfe, 0x80, [], 0x24}, 0x7, 0x7, 0x8, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 16:38:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x88f5, 0x5, &(0x7f00000002c0)=0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, 0x13, 0x400, 0x70bd26, 0x25dfdbfc, {0x2a, 0xff, 0x7f, 0x8, {0x4e1f, 0x4e21, [0x9, 0x2, 0x7fffffff, 0x401], [0x80001, 0x8000, 0x4, 0xfffff195], 0x0, [0x1, 0x8]}, 0x7, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xc5, 0x1, "f59d68b3ef93658ebf6baf5acba85e897ac6fd9c8e3d34291c42500772c44eb9ff7f011b56afd6b15dc97f3559527c67ed55cb05baeea6c493f593d83330fc57acbddae3f88ba965f4640e9ebea4008c7dd9886c4a4de8b832e6ee7e6d5dab018eb66649dd39059bacd8c25e32fe85982aafef1e7b94cc46180ec61839ab4bb643f181c674150deab5b78d8295a88674b7a787bae35ab20c37a12ee47f2fce78dbc8c30472edb91b304cd0a122d044ab695d292b6d27fd6868df013a8619f907f2"}]}, 0x114}, 0x1, 0x0, 0x0, 0x517227efa896c1e7}, 0x4040055) 16:38:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x20, 0x515a, 0x41, @remote, @dev={0xfe, 0x80, [], 0x24}, 0x7, 0x7, 0x8, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) socket$can_j1939(0x1d, 0x2, 0x7) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 16:38:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x88f5, 0x5, &(0x7f00000002c0)=0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x20, 0x515a, 0x41, @remote, @dev={0xfe, 0x80, [], 0x24}, 0x7, 0x7, 0x8, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 16:38:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 16:38:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x88f5, 0x5, &(0x7f00000002c0)=0x1) 16:38:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000700)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3c}}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="080000001b4d6b8e3e518a202b8ddd4392de17b01d7d766f", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf250200000008000c0003000000080018007f000001050014009b00000006000e000500000006001d00faff00000500220001000000050014000500000008001800ac1e0001140020000000000000000000000000000000000006001b004e230000"], 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x851) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3c}}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x4048841) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3c}}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="380000009d1c1869b594786e90bb7b8083820417efa8f49b16a0046d715312fe8f85b2bff08fd074b7aa85133763a402e8c0b80a120231136e4735da1e041e2a51cc40b1b59d9534236ec06b89ceb0", @ANYRES16=0x0, @ANYBLOB="010000000000000000000600000008000a0000000000140008006e6574706369300000000000000000000500070000000000"], 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x511402, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x60800, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3c}}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x8907, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x3, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e40000001900010028bd7000fcdbdf25021480810001fd0100220000080006000900000008000600000000000c00090007000a10", @ANYRES32=0x0, @ANYBLOB="08000600ff7f00007b0008808b567d810fa25613667cafd37941827e7b64321314a4c5f3b3c1969fda4625f82869f8de68a2a3266a2828f3b005ab92f8e61e95b100acb8a31c15aae4f9974fbe2d9ade105cf8894f869f6851c3423d04cf590e7bab29d85362c5dd41e52f85940dda7f94f3e4744692ebc79c0d3590cedf0e57e75ce90008000300", @ANYRES32=0x0, @ANYBLOB="480000000001010208000300", @ANYRES32=0x0, @ANYBLOB="08000b00ff7f000008000500ac1e0001"], 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4001) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3c}}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x3f, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x4, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x9, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x80, 0x80, 0x2, 0x3}}) 16:38:26 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/251, 0xfb}, 0x20000000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) 16:38:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x80, 0x2, 0x3}}) 16:38:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 0: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x0, 0x2, 0x3}}) 16:38:26 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:26 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 0: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1, 0x0, 0x0, 0x0, 0x3}}) 16:38:26 executing program 0: ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:26 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 16:38:26 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) [ 3190.169151][T22907] FAULT_INJECTION: forcing a failure. [ 3190.169151][T22907] name failslab, interval 1, probability 0, space 0, times 0 [ 3190.212846][T22907] CPU: 0 PID: 22907 Comm: syz-executor.1 Not tainted 5.12.0-rc4-syzkaller #0 [ 3190.221621][T22907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.231681][T22907] Call Trace: [ 3190.234951][T22907] dump_stack+0x137/0x19d [ 3190.239340][T22907] should_fail+0x23c/0x250 [ 3190.243754][T22907] __should_failslab+0x81/0x90 [ 3190.248585][T22907] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 3190.254371][T22907] should_failslab+0x5/0x20 [ 3190.258953][T22907] __kmalloc+0x66/0x380 [ 3190.263104][T22907] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 3190.269085][T22907] ? __rcu_read_unlock+0x5c/0x250 [ 3190.274181][T22907] tomoyo_realpath_from_path+0x98/0x3b0 [ 3190.279726][T22907] tomoyo_path_number_perm+0xc1/0x2d0 [ 3190.285136][T22907] ? __rcu_read_unlock+0x5c/0x250 [ 3190.290165][T22907] tomoyo_file_ioctl+0x1c/0x20 [ 3190.295020][T22907] security_file_ioctl+0x45/0x90 [ 3190.299957][T22907] __se_sys_ioctl+0x48/0x140 [ 3190.304587][T22907] __x64_sys_ioctl+0x3f/0x50 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) [ 3190.309386][T22907] do_syscall_64+0x39/0x80 [ 3190.313792][T22907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.319757][T22907] RIP: 0033:0x466459 [ 3190.323642][T22907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3190.343240][T22907] RSP: 002b:00007fc263a0f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3190.351645][T22907] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 16:38:27 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) [ 3190.359615][T22907] RDX: 0000000020000280 RSI: 000000000000890b RDI: 0000000000000003 [ 3190.367708][T22907] RBP: 00007fc263a0f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3190.375677][T22907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3190.383648][T22907] R13: 00007ffee23e799f R14: 00007fc263a0f300 R15: 0000000000022000 16:38:27 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:27 executing program 3: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 16:38:27 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:27 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3190.427716][T22907] ERROR: Out of memory at tomoyo_realpath_from_path. 16:38:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(0x0, 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) [ 3190.473376][T22935] FAULT_INJECTION: forcing a failure. [ 3190.473376][T22935] name failslab, interval 1, probability 0, space 0, times 0 [ 3190.486510][T22939] FAULT_INJECTION: forcing a failure. [ 3190.486510][T22939] name failslab, interval 1, probability 0, space 0, times 0 [ 3190.500884][T22939] CPU: 1 PID: 22939 Comm: syz-executor.1 Not tainted 5.12.0-rc4-syzkaller #0 [ 3190.509651][T22939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.519728][T22939] Call Trace: [ 3190.523041][T22939] dump_stack+0x137/0x19d [ 3190.527377][T22939] should_fail+0x23c/0x250 [ 3190.531781][T22939] __should_failslab+0x81/0x90 [ 3190.536598][T22939] ? tomoyo_encode2+0x1d3/0x350 [ 3190.541496][T22939] should_failslab+0x5/0x20 [ 3190.545995][T22939] __kmalloc+0x66/0x380 [ 3190.550146][T22939] tomoyo_encode2+0x1d3/0x350 [ 3190.554826][T22939] ? sock_free_inode+0x30/0x30 [ 3190.559640][T22939] tomoyo_realpath_from_path+0x35e/0x3b0 [ 3190.565449][T22939] tomoyo_path_number_perm+0xc1/0x2d0 [ 3190.570820][T22939] ? __rcu_read_unlock+0x5c/0x250 [ 3190.575838][T22939] tomoyo_file_ioctl+0x1c/0x20 [ 3190.580627][T22939] security_file_ioctl+0x45/0x90 [ 3190.585600][T22939] __se_sys_ioctl+0x48/0x140 [ 3190.590188][T22939] __x64_sys_ioctl+0x3f/0x50 [ 3190.594767][T22939] do_syscall_64+0x39/0x80 [ 3190.599180][T22939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.605066][T22939] RIP: 0033:0x466459 [ 3190.608942][T22939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3190.628535][T22939] RSP: 002b:00007fc263a0f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3190.636987][T22939] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3190.644961][T22939] RDX: 0000000020000280 RSI: 000000000000890b RDI: 0000000000000003 [ 3190.652921][T22939] RBP: 00007fc263a0f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3190.660903][T22939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:38:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(0x0, 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(0x0, 0x0, 0x4000) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) 16:38:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000000)) [ 3190.668963][T22939] R13: 00007ffee23e799f R14: 00007fc263a0f300 R15: 0000000000022000 [ 3190.676920][T22935] CPU: 0 PID: 22935 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 3190.683969][T22939] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3190.685681][T22935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.702493][T22935] Call Trace: [ 3190.705764][T22935] dump_stack+0x137/0x19d [ 3190.710153][T22935] should_fail+0x23c/0x250 [ 3190.714631][T22935] __should_failslab+0x81/0x90 16:38:27 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x13, 0x0, "bab88396fdb398c2c1d1f0e2b088c91c61b601e5575d8faab66aa7d6c932791bce117a17923232bf944f594e54d079ff6b8f04929479ca7777783bc335b48e4465ab5324371f9dd5428b32d49bddeea0"}, 0xd8) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 3190.719384][T22935] ? tomoyo_realpath_from_path+0x98/0x3b0 [ 3190.725095][T22935] should_failslab+0x5/0x20 [ 3190.729593][T22935] __kmalloc+0x66/0x380 [ 3190.733735][T22935] ? __mod_memcg_lruvec_state+0xfa/0x260 [ 3190.739366][T22935] ? __rcu_read_unlock+0x5c/0x250 [ 3190.744424][T22935] tomoyo_realpath_from_path+0x98/0x3b0 [ 3190.750003][T22935] tomoyo_path_number_perm+0xc1/0x2d0 [ 3190.755375][T22935] ? __rcu_read_unlock+0x5c/0x250 [ 3190.760389][T22935] tomoyo_file_ioctl+0x1c/0x20 [ 3190.765145][T22935] security_file_ioctl+0x45/0x90 [ 3190.770093][T22935] __se_sys_ioctl+0x48/0x140 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3190.774680][T22935] __x64_sys_ioctl+0x3f/0x50 [ 3190.779313][T22935] do_syscall_64+0x39/0x80 [ 3190.783749][T22935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.789645][T22935] RIP: 0033:0x466459 [ 3190.793528][T22935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3190.805285][T22956] FAULT_INJECTION: forcing a failure. 16:38:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) [ 3190.805285][T22956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3190.813268][T22935] RSP: 002b:00007f4e9a0fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3190.813290][T22935] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3190.813302][T22935] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000003 [ 3190.813313][T22935] RBP: 00007f4e9a0fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3190.813323][T22935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3190.813333][T22935] R13: 00007ffcc7830fef R14: 00007f4e9a0fe300 R15: 0000000000022000 [ 3190.875781][T22956] CPU: 1 PID: 22956 Comm: syz-executor.1 Not tainted 5.12.0-rc4-syzkaller #0 [ 3190.884566][T22956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3190.894609][T22956] Call Trace: [ 3190.897875][T22956] dump_stack+0x137/0x19d [ 3190.902207][T22956] should_fail+0x23c/0x250 [ 3190.904579][T22935] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3190.906692][T22956] should_fail_usercopy+0x16/0x20 [ 3190.918378][T22956] _copy_from_user+0x1c/0xd0 [ 3190.922982][T22956] inet6_ioctl+0xcb/0x150 [ 3190.927385][T22956] sock_do_ioctl+0x4d/0x210 [ 3190.931888][T22956] ? sock_poll+0x260/0x260 [ 3190.936360][T22956] sock_ioctl+0x321/0x510 [ 3190.940668][T22956] ? tomoyo_file_ioctl+0x1c/0x20 [ 3190.945601][T22956] ? sock_poll+0x260/0x260 [ 3190.949992][T22956] __se_sys_ioctl+0xcb/0x140 [ 3190.954663][T22956] __x64_sys_ioctl+0x3f/0x50 [ 3190.959264][T22956] do_syscall_64+0x39/0x80 [ 3190.963657][T22956] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3190.969537][T22956] RIP: 0033:0x466459 [ 3190.973406][T22956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3190.993022][T22956] RSP: 002b:00007fc263a0f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3191.001408][T22956] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3191.009353][T22956] RDX: 0000000020000280 RSI: 000000000000890b RDI: 0000000000000003 [ 3191.017372][T22956] RBP: 00007fc263a0f1d0 R08: 0000000000000000 R09: 0000000000000000 16:38:27 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:27 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 16:38:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:27 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) [ 3191.025359][T22956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3191.033710][T22956] R13: 00007ffee23e799f R14: 00007fc263a0f300 R15: 0000000000022000 16:38:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:27 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:27 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) 16:38:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3191.139279][T22974] FAULT_INJECTION: forcing a failure. [ 3191.139279][T22974] name failslab, interval 1, probability 0, space 0, times 0 [ 3191.153339][T22971] FAULT_INJECTION: forcing a failure. [ 3191.153339][T22971] name failslab, interval 1, probability 0, space 0, times 0 [ 3191.160586][T22974] CPU: 0 PID: 22974 Comm: syz-executor.1 Not tainted 5.12.0-rc4-syzkaller #0 [ 3191.174693][T22974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.184741][T22974] Call Trace: [ 3191.188036][T22974] dump_stack+0x137/0x19d [ 3191.192356][T22974] should_fail+0x23c/0x250 [ 3191.196826][T22974] __should_failslab+0x81/0x90 [ 3191.201757][T22974] ? fib6_info_alloc+0x28/0x80 [ 3191.206508][T22974] should_failslab+0x5/0x20 [ 3191.211033][T22974] __kmalloc+0x66/0x380 [ 3191.215170][T22974] fib6_info_alloc+0x28/0x80 [ 3191.219886][T22974] ip6_route_info_create+0x38b/0xcc0 [ 3191.225194][T22974] ? apparmor_capable+0xfe/0x160 [ 3191.230121][T22974] ? bpf_lsm_capable+0x5/0x10 [ 3191.234787][T22974] ip6_route_add+0x22/0x100 [ 3191.239279][T22974] ipv6_route_ioctl+0x27e/0x2c0 [ 3191.244144][T22974] inet6_ioctl+0x120/0x150 [ 3191.248542][T22974] sock_do_ioctl+0x4d/0x210 [ 3191.253032][T22974] ? sock_poll+0x260/0x260 [ 3191.257445][T22974] sock_ioctl+0x321/0x510 [ 3191.261787][T22974] ? tomoyo_file_ioctl+0x1c/0x20 [ 3191.266736][T22974] ? sock_poll+0x260/0x260 [ 3191.271138][T22974] __se_sys_ioctl+0xcb/0x140 [ 3191.275713][T22974] __x64_sys_ioctl+0x3f/0x50 [ 3191.280294][T22974] do_syscall_64+0x39/0x80 [ 3191.284785][T22974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.290670][T22974] RIP: 0033:0x466459 [ 3191.294540][T22974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3191.314386][T22974] RSP: 002b:00007fc263a0f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3191.322854][T22974] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3191.330809][T22974] RDX: 0000000020000280 RSI: 000000000000890b RDI: 0000000000000003 [ 3191.338761][T22974] RBP: 00007fc263a0f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3191.346726][T22974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3191.354691][T22974] R13: 00007ffee23e799f R14: 00007fc263a0f300 R15: 0000000000022000 [ 3191.362664][T22971] CPU: 1 PID: 22971 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 3191.371454][T22971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.381678][T22971] Call Trace: [ 3191.384948][T22971] dump_stack+0x137/0x19d 16:38:28 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) [ 3191.389290][T22971] should_fail+0x23c/0x250 [ 3191.394301][T22971] __should_failslab+0x81/0x90 [ 3191.399127][T22971] ? tomoyo_encode2+0x1d3/0x350 [ 3191.404010][T22971] should_failslab+0x5/0x20 [ 3191.408549][T22971] __kmalloc+0x66/0x380 [ 3191.412697][T22971] tomoyo_encode2+0x1d3/0x350 [ 3191.417428][T22971] ? sock_free_inode+0x30/0x30 [ 3191.422210][T22971] tomoyo_realpath_from_path+0x35e/0x3b0 [ 3191.427874][T22971] tomoyo_path_number_perm+0xc1/0x2d0 [ 3191.433282][T22971] ? __rcu_read_unlock+0x5c/0x250 [ 3191.438322][T22971] tomoyo_file_ioctl+0x1c/0x20 [ 3191.443091][T22971] security_file_ioctl+0x45/0x90 [ 3191.448023][T22971] __se_sys_ioctl+0x48/0x140 [ 3191.452607][T22971] __x64_sys_ioctl+0x3f/0x50 [ 3191.457195][T22971] do_syscall_64+0x39/0x80 [ 3191.461611][T22971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.467501][T22971] RIP: 0033:0x466459 [ 3191.471368][T22971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3191.490957][T22971] RSP: 002b:00007f4e9a0fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3191.499396][T22971] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3191.507414][T22971] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000003 [ 3191.515362][T22971] RBP: 00007f4e9a0fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3191.523365][T22971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3191.531328][T22971] R13: 00007ffcc7830fef R14: 00007f4e9a0fe300 R15: 0000000000022000 16:38:28 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:28 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:28 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:28 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) [ 3191.551611][T22971] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3191.592493][T22992] FAULT_INJECTION: forcing a failure. [ 3191.592493][T22992] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3191.624043][T22992] CPU: 1 PID: 22992 Comm: syz-executor.1 Not tainted 5.12.0-rc4-syzkaller #0 [ 3191.632839][T22992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 3191.642885][T22992] Call Trace: [ 3191.646157][T22992] dump_stack+0x137/0x19d [ 3191.650489][T22992] should_fail+0x23c/0x250 [ 3191.656753][T22992] should_fail_usercopy+0x16/0x20 [ 3191.661770][T22992] _copy_to_user+0x1c/0x90 [ 3191.666355][T22992] simple_read_from_buffer+0xab/0x120 [ 3191.671798][T22992] proc_fail_nth_read+0xf6/0x140 [ 3191.676789][T22992] ? rw_verify_area+0x136/0x250 [ 3191.681638][T22992] ? proc_fault_inject_write+0x200/0x200 [ 3191.687269][T22992] vfs_read+0x154/0x5d0 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x80, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 3191.691426][T22992] ? __fget_light+0x219/0x260 [ 3191.697559][T22992] ? sock_poll+0x260/0x260 [ 3191.702024][T22992] ksys_read+0xce/0x180 [ 3191.706173][T22992] __x64_sys_read+0x3e/0x50 [ 3191.710754][T22992] do_syscall_64+0x39/0x80 [ 3191.715167][T22992] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.721062][T22992] RIP: 0033:0x4191dc [ 3191.724941][T22992] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0xfd, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 3191.744646][T22992] RSP: 002b:00007fc263a0f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3191.753055][T22992] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004191dc [ 3191.761035][T22992] RDX: 000000000000000f RSI: 00007fc263a0f1e0 RDI: 0000000000000004 [ 3191.769016][T22992] RBP: 00007fc263a0f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3191.776978][T22992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3191.784941][T22992] R13: 00007ffee23e799f R14: 00007fc263a0f300 R15: 0000000000022000 [ 3191.803050][T22997] FAULT_INJECTION: forcing a failure. [ 3191.803050][T22997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3191.822541][T22997] CPU: 0 PID: 22997 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 3191.831311][T22997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3191.841358][T22997] Call Trace: [ 3191.844625][T22997] dump_stack+0x137/0x19d [ 3191.848976][T22997] should_fail+0x23c/0x250 [ 3191.853368][T22997] ? sock_poll+0x260/0x260 [ 3191.857762][T22997] should_fail_usercopy+0x16/0x20 [ 3191.862780][T22997] _copy_from_user+0x1c/0xd0 [ 3191.867409][T22997] sock_ioctl+0x441/0x510 [ 3191.871730][T22997] ? tomoyo_file_ioctl+0x1c/0x20 [ 3191.876645][T22997] ? sock_poll+0x260/0x260 [ 3191.881051][T22997] __se_sys_ioctl+0xcb/0x140 [ 3191.885618][T22997] __x64_sys_ioctl+0x3f/0x50 [ 3191.890186][T22997] do_syscall_64+0x39/0x80 [ 3191.894625][T22997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3191.900653][T22997] RIP: 0033:0x466459 [ 3191.904533][T22997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3191.924118][T22997] RSP: 002b:00007f4e9a0fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3191.932553][T22997] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3191.940505][T22997] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000003 16:38:28 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x3, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) 16:38:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) 16:38:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) [ 3191.948454][T22997] RBP: 00007f4e9a0fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3191.956403][T22997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3191.964396][T22997] R13: 00007ffcc7830fef R14: 00007f4e9a0fe300 R15: 0000000000022000 [ 3192.019343][T23017] FAULT_INJECTION: forcing a failure. [ 3192.019343][T23017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3192.043057][T23017] CPU: 0 PID: 23017 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 3192.051921][T23017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.061968][T23017] Call Trace: [ 3192.065238][T23017] dump_stack+0x137/0x19d 16:38:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) 16:38:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, 0x0) [ 3192.069571][T23017] should_fail+0x23c/0x250 [ 3192.074099][T23017] should_fail_usercopy+0x16/0x20 [ 3192.079119][T23017] _copy_from_user+0x1c/0xd0 [ 3192.083762][T23017] ip6_tnl_ioctl+0x267/0x750 [ 3192.088400][T23017] ? full_name_hash+0x97/0xe0 [ 3192.093154][T23017] ? strcmp+0x23/0x50 [ 3192.097141][T23017] ? ip6_tnl_start_xmit+0xa10/0xa10 [ 3192.102354][T23017] dev_ifsioc+0x4cf/0x6a0 [ 3192.106682][T23017] dev_ioctl+0x42f/0x610 [ 3192.110917][T23017] ? sock_poll+0x260/0x260 [ 3192.115373][T23017] sock_ioctl+0x476/0x510 [ 3192.119791][T23017] ? sock_poll+0x260/0x260 [ 3192.124189][T23017] __se_sys_ioctl+0xcb/0x140 [ 3192.128758][T23017] __x64_sys_ioctl+0x3f/0x50 [ 3192.133326][T23017] do_syscall_64+0x39/0x80 [ 3192.137718][T23017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3192.143676][T23017] RIP: 0033:0x466459 [ 3192.147544][T23017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:38:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, 0x0) 16:38:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3192.167150][T23017] RSP: 002b:00007f4e9a0fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3192.175541][T23017] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3192.183491][T23017] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000003 [ 3192.191511][T23017] RBP: 00007f4e9a0fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3192.199470][T23017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3192.207437][T23017] R13: 00007ffcc7830fef R14: 00007f4e9a0fe300 R15: 0000000000022000 16:38:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x2, &(0x7f0000000280)) 16:38:29 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, 0x0) 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, 0x0) [ 3192.309206][T23044] FAULT_INJECTION: forcing a failure. [ 3192.309206][T23044] name failslab, interval 1, probability 0, space 0, times 0 [ 3192.352305][T23044] CPU: 1 PID: 23044 Comm: syz-executor.4 Not tainted 5.12.0-rc4-syzkaller #0 [ 3192.361085][T23044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.371133][T23044] Call Trace: [ 3192.374409][T23044] dump_stack+0x137/0x19d [ 3192.378734][T23044] should_fail+0x23c/0x250 [ 3192.383142][T23044] __should_failslab+0x81/0x90 [ 3192.387903][T23044] should_failslab+0x5/0x20 [ 3192.392483][T23044] kmem_cache_alloc_node+0x56/0x310 [ 3192.397725][T23044] ? __alloc_skb+0xed/0x420 16:38:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:29 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) [ 3192.402226][T23044] ? tun_device_event+0x49/0x930 [ 3192.407152][T23044] __alloc_skb+0xed/0x420 [ 3192.411469][T23044] rtmsg_ifinfo_build_skb+0x61/0x130 [ 3192.416768][T23044] rtmsg_ifinfo+0x58/0xc0 [ 3192.421151][T23044] netdev_state_change+0x106/0x160 [ 3192.426337][T23044] ip6_tnl_ioctl+0x634/0x750 [ 3192.428030][T23054] FAULT_INJECTION: forcing a failure. [ 3192.428030][T23054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3192.430985][T23044] ? ip6_tnl_start_xmit+0xa10/0xa10 [ 3192.449184][T23044] dev_ifsioc+0x4cf/0x6a0 [ 3192.453508][T23044] dev_ioctl+0x42f/0x610 [ 3192.457733][T23044] ? sock_poll+0x260/0x260 [ 3192.462134][T23044] sock_ioctl+0x476/0x510 [ 3192.466527][T23044] ? sock_poll+0x260/0x260 [ 3192.470931][T23044] __se_sys_ioctl+0xcb/0x140 [ 3192.475563][T23044] __x64_sys_ioctl+0x3f/0x50 [ 3192.480417][T23044] do_syscall_64+0x39/0x80 [ 3192.484823][T23044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3192.490709][T23044] RIP: 0033:0x466459 [ 3192.494586][T23044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3192.514207][T23044] RSP: 002b:00007f4e9a0fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3192.522608][T23044] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3192.530566][T23044] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000003 [ 3192.538529][T23044] RBP: 00007f4e9a0fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3192.546573][T23044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3192.554532][T23044] R13: 00007ffcc7830fef R14: 00007f4e9a0fe300 R15: 0000000000022000 [ 3192.562560][T23054] CPU: 0 PID: 23054 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 3192.571315][T23054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.581365][T23054] Call Trace: [ 3192.584661][T23054] dump_stack+0x137/0x19d [ 3192.589003][T23054] should_fail+0x23c/0x250 [ 3192.593398][T23054] should_fail_usercopy+0x16/0x20 [ 3192.598444][T23054] _copy_to_user+0x1c/0x90 [ 3192.602854][T23054] udp_lib_getsockopt+0x1ff/0x260 [ 3192.607859][T23054] udpv6_getsockopt+0x55/0x80 [ 3192.612519][T23054] sock_common_getsockopt+0x53/0x60 [ 3192.617698][T23054] ? sock_recv_errqueue+0x2f0/0x2f0 [ 3192.622875][T23054] __sys_getsockopt+0x1f9/0x3b0 [ 3192.627767][T23054] __x64_sys_getsockopt+0x62/0x70 [ 3192.632773][T23054] do_syscall_64+0x39/0x80 [ 3192.637168][T23054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3192.643043][T23054] RIP: 0033:0x466459 [ 3192.646933][T23054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3192.666520][T23054] RSP: 002b:00007f70510e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 3192.674923][T23054] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 3192.682872][T23054] RDX: 0000000000000001 RSI: 0000000000000011 RDI: 0000000000000003 [ 3192.690822][T23054] RBP: 00007f70510e01d0 R08: 0000000020000080 R09: 0000000000000000 [ 3192.698771][T23054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3192.706722][T23054] R13: 00007ffcf200969f R14: 00007f70510e0300 R15: 0000000000022000 [ 3192.716949][T29936] ================================================================== [ 3192.725016][T29936] BUG: KCSAN: data-race in ieee80211_rx_handlers / ieee80211_sta_last_active [ 3192.733775][T29936] [ 3192.736094][T29936] write to 0xffff88812ddeb220 of 8 bytes by interrupt on cpu 1: [ 3192.743713][T29936] ieee80211_rx_handlers+0x67d/0x70a0 [ 3192.749167][T29936] ieee80211_prepare_and_rx_handle+0x191d/0x27b0 [ 3192.755498][T29936] ieee80211_rx_list+0x1449/0x1570 [ 3192.760610][T29936] ieee80211_rx_napi+0x4f/0x130 [ 3192.765451][T29936] ieee80211_tasklet_handler+0xef/0x140 [ 3192.771003][T29936] tasklet_action_common+0x81/0xa0 [ 3192.776110][T29936] __do_softirq+0x13c/0x2c3 [ 3192.780599][T29936] run_ksoftirqd+0x13/0x20 [ 3192.784998][T29936] smpboot_thread_fn+0x34f/0x520 [ 3192.789929][T29936] kthread+0x20b/0x230 [ 3192.793975][T29936] ret_from_fork+0x1f/0x30 [ 3192.798382][T29936] [ 3192.800703][T29936] read to 0xffff88812ddeb220 of 8 bytes by task 29936 on cpu 0: [ 3192.808320][T29936] ieee80211_sta_last_active+0x171/0x1b0 [ 3192.813930][T29936] ieee80211_ibss_work+0x314/0xd90 [ 3192.819022][T29936] ieee80211_iface_work+0x628/0x670 [ 3192.824203][T29936] process_one_work+0x3e1/0x950 [ 3192.829046][T29936] worker_thread+0x616/0xa70 [ 3192.833630][T29936] kthread+0x20b/0x230 [ 3192.837682][T29936] ret_from_fork+0x1f/0x30 [ 3192.842080][T29936] [ 3192.844378][T29936] Reported by Kernel Concurrency Sanitizer on: 16:38:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x10, &(0x7f0000000280)) 16:38:29 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) [ 3192.850499][T29936] CPU: 0 PID: 29936 Comm: kworker/u4:5 Not tainted 5.12.0-rc4-syzkaller #0 [ 3192.859063][T29936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.869104][T29936] Workqueue: phy12 ieee80211_iface_work [ 3192.874634][T29936] ================================================================== 16:38:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:29 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) [ 3192.909215][T23058] FAULT_INJECTION: forcing a failure. [ 3192.909215][T23058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3192.923127][T23058] CPU: 0 PID: 23058 Comm: syz-executor.2 Not tainted 5.12.0-rc4-syzkaller #0 [ 3192.931891][T23058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3192.941940][T23058] Call Trace: [ 3192.945212][T23058] dump_stack+0x137/0x19d [ 3192.949538][T23058] should_fail+0x23c/0x250 [ 3192.954070][T23058] should_fail_usercopy+0x16/0x20 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x0, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x0, 0x1, 0x4}}) 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x0, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3192.959128][T23058] _copy_to_user+0x1c/0x90 [ 3192.963551][T23058] simple_read_from_buffer+0xab/0x120 [ 3192.968928][T23058] proc_fail_nth_read+0xf6/0x140 [ 3192.973859][T23058] ? rw_verify_area+0x136/0x250 [ 3192.978770][T23058] ? proc_fault_inject_write+0x200/0x200 [ 3192.984403][T23058] vfs_read+0x154/0x5d0 [ 3192.988628][T23058] ? __fget_light+0x219/0x260 [ 3192.993379][T23058] ? sock_common_getsockopt+0x53/0x60 [ 3192.998748][T23058] ksys_read+0xce/0x180 [ 3193.002902][T23058] __x64_sys_read+0x3e/0x50 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x0, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 3193.007437][T23058] do_syscall_64+0x39/0x80 [ 3193.011861][T23058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 3193.017755][T23058] RIP: 0033:0x4191dc [ 3193.021632][T23058] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3193.041229][T23058] RSP: 002b:00007f70510e0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3193.049718][T23058] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004191dc 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x0, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x4c01, &(0x7f0000000280)) 16:38:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x0, 0x0, 0x4}}) 16:38:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) [ 3193.057681][T23058] RDX: 000000000000000f RSI: 00007f70510e01e0 RDI: 0000000000000004 [ 3193.065715][T23058] RBP: 00007f70510e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 3193.073673][T23058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3193.081639][T23058] R13: 00007ffcf200969f R14: 00007f70510e0300 R15: 0000000000022000 16:38:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x541b, &(0x7f0000000280)) 16:38:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x0, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback}}) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5421, &(0x7f0000000280)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x10, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x0, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x0, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000080)) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5450, &(0x7f0000000280)) 16:38:30 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x4c01, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000080)) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x0, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x541b, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5451, &(0x7f0000000280)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x64, 0x0, &(0x7f0000000080)) 16:38:30 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x0, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5421, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000080)) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x0, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5452, &(0x7f0000000280)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5450, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000080)) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5460, &(0x7f0000000280)) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x0, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x7, 0x1, 0x4}}) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5451, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x0, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x300, 0x0, &(0x7f0000000080)) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x0, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x6364, &(0x7f0000000280)) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000280)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5460, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x0, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8902, &(0x7f0000000280)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x6364, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)=0x4) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x0, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x88, 0x1, 0x0, &(0x7f0000000080)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)=0x4000000) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8903, &(0x7f0000000280)) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x0, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x0, 0x0, &(0x7f0000000080)) 16:38:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8911, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, 0x0, &(0x7f0000000040)) 16:38:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000280)) 16:38:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x0, 0x0, &(0x7f0000000080)) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8913, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x0, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x28000}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x100) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8906, &(0x7f0000000280)) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', 0x0}) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x0, 0x0, &(0x7f0000000080)) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x2, {0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x39}, 0x739}}}, 0x38) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x2b42, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x80, 0x1, 0x40, @dev={0xfe, 0x80, [], 0x40}, @dev={0xfe, 0x80, [], 0x39}, 0x700, 0x10, 0x4000, 0x100}}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0xe6, 0x2, 0xfffffff7, 0x1, @mcast2, @mcast1, 0x0, 0x20, 0x22e212c8, 0xf0fb}}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsu\x00', 0x80040, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000004c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xa538}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0xc0a5}, 0x40) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x0, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x0, 0x1, 0x4}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8907, &(0x7f0000000280)) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x0, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x0, 0x0, 0x0, 0x4}}) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, 0x0) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, 0x0) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x0, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890c, &(0x7f0000000280)) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)=0x3) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback}}) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x88, 0x1, 0x0, 0x0) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8913, &(0x7f0000000280)) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x0, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x508c0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x4, 0x7, {"15379cfb057ac234dde5152607483f65"}, 0x0, 0x1, 0x10000}}}, 0xa0) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891e, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x0, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x6c, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x2f, 0x81, 0x9, 0x8d, 0x9, @private2={0xfc, 0x2, [], 0x1}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x700, 0x8, 0x1ff}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffffffffff9}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macvlan1\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x5) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x5, 0x1f, 0x3, 0x44, @local, @private0, 0x80, 0x7800, 0xfffffff9, 0x40}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8914, &(0x7f0000000280)) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8920, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x0, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x1f}, 0x10) 16:38:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x0, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8921, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x40840) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="680000005a1e39c56367fb34cc7fe6c75307db56ee1700cf407c6fd5af3b58dc6b26c09c083cce7dc016354f95e4217b55ec86e984f435163c927fb9d91189874064e9185ec185c454c7ee6c2ea401ad0efc12e51be7968d601cdac85fe262496248c11905dfbf35b9ce38a43a", @ANYRES16=0x0, @ANYBLOB="020028bd7000ffdbdf250200000008001700", @ANYRES32=r2, @ANYBLOB="06001a004e24000005000d000000000006000100050000000500040000000000c15c1f254c28505308000900010000000800110000000000140008006970366772653000100000000000000058a3db9de85d788fb1292fb8b5784aa2d0ecaca22c1439449a079a55add6d52a8c7b736f1603dd728ec15f0a8431be9b8f8569f0b4aa15bd402428399eaffdae24fd143df130224ea6effea046e810150d16559d79505d7b07220271da1eb94fcc414e65d8d11c2300ecb5fc2f40ffbdeb49b5a8d7f7fb5a2cdccaa081158393c32b"], 0x68}, 0x1, 0x0, 0x0, 0x200008c0}, 0x94) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8916, &(0x7f0000000280)) 16:38:31 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8918, &(0x7f0000000280)) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8923, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) [ 3195.027950][T23366] ip6tnl0: mtu greater than device maximum 16:38:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000100)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet_udp(0x2, 0x2, 0x0) 16:38:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8933, &(0x7f0000000280)) 16:38:31 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:31 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8924, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000001200)='/dev/input/mice\x00', 0x0) getsockname$llc(r0, &(0x7f0000001240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f00000000c0)=0xfffffffffffffcdc) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x553441, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000001140)='/dev/input/mice\x00', 0x400000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000011c0)={r2, &(0x7f0000000140)="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", &(0x7f0000001180)=@udp6=r3, 0x2}, 0x20) getsockopt$inet6_udp_int(r1, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:31 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8936, &(0x7f0000000280)) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000200)="f5d6e033ac8de604ba7e9dcb6315491fd3ceb644471e75f64cabe4172688c01d15a6e2d92f8cac255f45b5ec50e04424c2cd7b0e75af33e671edf279eb227dea66c9", &(0x7f0000000280)=@udp}, 0x20) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x38}}, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x20201, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r4, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r6}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000881) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8929, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, 0x0) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8940, &(0x7f0000000280)) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x58, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x24000010}, 0x14) 16:38:32 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, 0x0) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x5, 0x4, 0x3, 0x9, 0x14, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8931, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8941, &(0x7f0000000280)) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = socket(0xb, 0x80000, 0x6) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1b, 0x0) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, 0x0) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x5, 0x4, 0x3, 0x9, 0x14, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x894c, &(0x7f0000000280)) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x301280) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x5, 0x4, 0x3, 0x9, 0x14, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8982, &(0x7f0000000280)) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x2) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8937, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8983, &(0x7f0000000280)) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40001, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100027bd7000fcdbdf250100000008001800ac14143a14002000fe8000000000000000000000000000bb08001900ffffffff08000b000200000008001800ac14142b05000500000000000500220001000000080004000300000005000700030000000500070002000000"], 0x70}, 0x1, 0x0, 0x0, 0x200040c0}, 0x24000040) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000001c0)=@gcm_128={{0x304}, "c9d16583cf3e0cbb", "213191a0e755d8880b73e2559ce78fda", "b95f1a02", "36bcc9e8a1c7c19f"}, 0x28) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8942, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89a0, &(0x7f0000000280)) 16:38:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x9b, 0x6, 0x7fff, 0x1, @mcast2, @private2={0xfc, 0x2, [], 0x1}, 0x745, 0x7, 0x1, 0x4de7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r2, 0x6, 0x2, 0x0, 0xc7f, 0x20, @ipv4={[], [], @local}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x8000, 0x10, 0x200, 0x9}}) 16:38:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89a1, &(0x7f0000000280)) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000040)) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89f0, &(0x7f0000000280)) 16:38:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x1f, 0x5, 0x6, 0x2c, @private2={0xfc, 0x2, [], 0x1}, @local, 0x80, 0x80, 0x19, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl2\x00', r2, 0x4, 0x1, 0x0, 0x80, 0x48, @local, @remote, 0x7, 0x700, 0x1, 0x7}}) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8947, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:32 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x89f2, &(0x7f0000000280)) 16:38:32 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8949, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:33 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x894a, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000000180)={0x3, 0xffffffff, 0x20, 0x1, 0x0, 0x7ff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0x1d, 0x80000, 0xbb8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000300)={0x4, 0x1, 0xbc4, 0x100}) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00{', @ANYRES16=0x0, @ANYBLOB="00042dbd7000fcdbdf2500000000050022000100000014002000fc0100000000000000000000000000000c0016000700000000000000080011000000000014002000ff02000000000000000000000000000105000700020000000c0010000200000000000000"], 0x6c}}, 0x20000000) r3 = syz_open_dev$hiddev(&(0x7f00000001c0)='/dev/usb/hiddev#\x00', 0x80000000, 0x40c00) ioctl$HIDIOCGDEVINFO(r3, 0x801c4803, &(0x7f0000000200)=""/240) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r4}, 0x8) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000540)={'syztnl1\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x29, 0x7, 0x0, 0xfffffff7, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, 0x20, 0x700, 0x5b, 0x8001}}) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)=@bridge_dellink={0x140, 0x11, 0x800, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, r6, 0x10400, 0x40000}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xfffff001}, @IFLA_PHYS_SWITCH_ID={0x5, 0x24, '\\'}, @IFLA_CARRIER={0x5, 0x21, 0x89}, @IFLA_VFINFO_LIST={0x108, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_TRUST={0xc, 0x9, {0x401, 0x1000}}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc, 0x5, {0xf42c, 0x9}}]}, {0x64, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x1, 0x9}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x2, 0x40}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7, 0x9}}, @IFLA_VF_RATE={0x10, 0x6, {0x7f, 0x7, 0x8001}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x7ff, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x400}}, @IFLA_VF_TRUST={0xc, 0x9, {0x8, 0x7}}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x81, 0xb9e, 0x80000000, 0x8100}}, {0x14, 0x1, {0x20, 0x950, 0x7fff, 0x88a8}}, {0x14, 0x1, {0x1, 0x7c2, 0x8, 0x88a8}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6d, 0x9}}]}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4000}, 0x1) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x10, 0x3fb, 0x2, 0x70bd28, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000014}, 0x0) 16:38:33 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400448c9, &(0x7f0000000280)) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, 0x0) 16:38:33 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8970, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400448dd, &(0x7f0000000280)) 16:38:33 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r1, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, 0x0) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x400454ca, &(0x7f0000000280)) 16:38:33 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, 0xfffffffffffffffe, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x4, 0x80, 0xc3, 0x1, 0x2, @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7800, 0x0, 0x9, 0xfff}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'sit0\x00', r1, 0x2f, 0x3, 0xff, 0xffffffff, 0x3, @mcast2, @rand_addr=' \x01\x00', 0x40, 0x20, 0x1, 0xfffffffe}}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000225bd7000fedbdf2500000000050006000600000008001700", @ANYRES32=r3, @ANYBLOB="08000c000100000008001800ac14142c050005000100000014002000fe80000000000000000000000000000c"], 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0xa, 0x0, &(0x7f0000000080)) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="020529bd7000fcfb14dbdf25070000000500130009000000"], 0x1c}, 0x1, 0x0, 0x0, 0x115}, 0x200000c4) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r0, r4, 0xd}, 0x10) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, 0x0, &(0x7f0000000000)) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, 0x0) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x40049409, &(0x7f0000000280)) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0x5f, 0x40, 0x7fffffff, 0x3b, @remote, @mcast1, 0x700, 0x10, 0x3ff, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0xa, 0x0, &(0x7f0000000000)) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, 0x0) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x40186366, &(0x7f0000000280)) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x400) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, 0x0, &(0x7f0000000000)=0xfffffffffffffff4) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8993, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x4020940d, &(0x7f0000000280)) 16:38:33 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00', 0xffffffffffffffff) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000003040)='/dev/btrfs-control\x00', 0x420000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000003140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003100)={&(0x7f0000003080)={0x58, r1, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xd3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1f}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x700, 0x0) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80086301, &(0x7f0000000280)) 16:38:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000940)={'tunl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x1, 0x0, 0x3b, @loopback, @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x8000, 0x1, 0x8}}) 16:38:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8994, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', 0x0, 0x29, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80108906, &(0x7f0000000280)) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x0, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = getpid() ptrace$poke(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x100000000, 0x0, 0x9}, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 16:38:33 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8995, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x0, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89a2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x80108907, &(0x7f0000000280)) 16:38:33 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x0, 0x8, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:33 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0045878, &(0x7f0000000280)) 16:38:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000000)=0x49) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x8, 0x6, 0x60, @empty, @private0={0xfc, 0x0, [], 0x1}, 0x700, 0x700, 0x40, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'syztnl2\x00', r1, 0x2f, 0x1, 0x6, 0x1, 0x14, @dev={0xfe, 0x80, [], 0x1d}, @remote, 0x700, 0x7, 0x2, 0x4}}) 16:38:34 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8990, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x708, 0x8, 0x3, 0x5, {{0x6, 0x4, 0x3, 0x9, 0x18, 0x64, 0x0, 0x30, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r1, 0x29, 0x0, 0x0, 0x5, 0x4, @ipv4={[], [], @multicast2}, @empty, 0x20, 0x8000, 0x8000, 0x1}}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000500", @ANYRES16=0x0, @ANYBLOB="100028bd7000fb08f9db7e97bba72f5831795219eba54379cc56c96cf266"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket$inet6_udplite(0xa, 0x2, 0x88) 16:38:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0xc0045878, &(0x7f0000000280)) 16:38:34 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x8991, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 16:38:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'i