0x4, &(0x7f0000000a00)) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x40142, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) 04:31:54 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r2, 0x0) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x8040) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000a80)='./file0\x00', 0x0, &(0x7f0000000fc0)=[&(0x7f0000000dc0)='[/}#\x00', &(0x7f0000000e00)='/dev/zero\x00', &(0x7f0000000e40)='\')-[\'-\x00', &(0x7f0000000e80)='(\\&\x00', &(0x7f0000000ec0)='\')-[\'-\x00', &(0x7f0000000f00)='{\x00', &(0x7f0000000f40)='-%\x00', &(0x7f0000000f80)='/dev/rfkill\x00'], 0x0) pipe2(0x0, 0x80800) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x40142, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) 04:31:54 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:54 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:54 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:54 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000a80)='./file0\x00', 0x0, &(0x7f0000000fc0)=[&(0x7f0000000dc0)='[/}#\x00', &(0x7f0000000e00)='/dev/zero\x00', &(0x7f0000000e40)='\')-[\'-\x00', &(0x7f0000000e80)='(\\&\x00', &(0x7f0000000ec0)='\')-[\'-\x00', &(0x7f0000000f00)='{\x00', &(0x7f0000000f40)='-%\x00', &(0x7f0000000f80)='/dev/rfkill\x00'], 0x0) pipe2(&(0x7f0000001000), 0x0) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x40142, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) 04:31:54 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 1: socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) 04:31:54 executing program 1: socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:54 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:54 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) 04:31:54 executing program 1: socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:54 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:54 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) 04:31:54 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10010, r0, 0x0) 04:31:55 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) 04:31:55 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) 04:31:55 executing program 1: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, r0, 0x0) 04:31:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, 0x0, 0x40040) 04:31:55 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), 0xffffffffffffffff) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) 04:31:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, 0x0, 0x0) 04:31:55 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), 0xffffffffffffffff) 04:31:55 executing program 1: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) fsmount(0xffffffffffffffff, 0x0, 0x4) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:55 executing program 1: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 4: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), 0xffffffffffffffff) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 5: fsmount(0xffffffffffffffff, 0x0, 0x4) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 5: fsmount(0xffffffffffffffff, 0x0, 0x0) 04:31:55 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 0: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 4: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 4: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 4: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 5: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 5: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 1: socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:55 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x4, 0x0) 04:31:55 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:55 executing program 5: socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: socketpair(0x1, 0x5, 0x4, 0x0) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: socketpair(0x0, 0x5, 0x4, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: socketpair(0x0, 0x0, 0x4, 0x0) 04:31:56 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 1: socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x5, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 1: socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 4: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000a00)) 04:31:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:56 executing program 1: socketpair(0x0, 0x5, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:56 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:56 executing program 1: socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x0, 0x4, 0x0) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, 0xffffffffffffffff, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:56 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, 0xffffffffffffffff, 0x0) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:56 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, 0xffffffffffffffff, 0x0) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:56 executing program 1: socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000a00)) 04:31:56 executing program 3: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) 04:31:56 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:56 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:56 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:56 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:56 executing program 2: socketpair(0x1, 0x0, 0x0, 0x0) 04:31:56 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:56 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:56 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) 04:31:57 executing program 2: socketpair(0x1, 0x0, 0x0, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) setsockopt$packet_buf(r3, 0x107, 0xd, &(0x7f0000000e00)="da75254c08b239c0abda92e12f512d642d0faa50c3dfebda6f3b7f02e3732a16baeb4906668d9535f4ee8b8c7f09bd1d1b46fbd7232086fee1943bd3778681a290ed457e1fedf850d7eea29d3a95df41cee41c2e3ff1dd279991a7e6ac3664da400bce2bf5d0d289c3f102764983b31f26a51f2e08", 0x75) 04:31:57 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r0, 0x0) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 2: socketpair(0x1, 0x0, 0x0, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x85}, 0x40) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:57 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10010, r0, 0x0) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) 04:31:57 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, r0, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000c80)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0xc0, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32c5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x40040) 04:31:57 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r6, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x7, 0x1, 0x505, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x4) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) socketpair(0x1, 0x5, 0x4, &(0x7f0000000a00)) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x19c, r2, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x24044095}, 0x4840) 04:31:57 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r6, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:31:57 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r6, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:31:57 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r2, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r4, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x800, 0x5, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc9}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb559}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5574}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf97}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:31:57 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:57 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:31:57 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 04:31:57 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:57 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:57 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff1000/0xe000)=nil, 0xe000, 0x9, 0x10010, r2, 0x0) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x40142, 0x0) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000003c0)) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r1) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) fsmount(0xffffffffffffffff, 0x0, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:31:58 executing program 0: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000340)="a89447706039edfe587a95abb0469aa8", 0x10) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x200003, 0x0) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) r0 = fsmount(0xffffffffffffffff, 0x0, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, 0x0, 0x9, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}, @NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @rand_addr=0x64010100}}}]}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1}}}]}]}, 0x12c}}, 0x44034) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r3, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) fsmount(0xffffffffffffffff, 0x0, 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 04:31:58 executing program 5: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0xb, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}, 0x24}}, 0x8040) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 04:31:58 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x40) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, 0x0, 0x200003, 0x0) 04:31:58 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x40) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 04:31:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:58 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 04:31:58 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x40) 04:31:58 executing program 2: ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 04:31:58 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 04:31:58 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:58 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x40) 04:31:58 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:58 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:59 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x8010) 04:31:59 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x8010) 04:31:59 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40800, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x4000, 0x0) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16}, 0x68) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, 0x0, 0x8010) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16}, 0x68) 04:31:59 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x40) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x40) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x40) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(r0, 0x0, &(0x7f0000000580)) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, 0x0}, 0x68) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:31:59 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 04:31:59 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x8010) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x40) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:31:59 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug', 0x0, 0x0) 04:31:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 04:31:59 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:31:59 executing program 2: accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580)) 04:31:59 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 04:31:59 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:31:59 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:00 executing program 2: accept$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r2, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) write$rfkill(r2, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) write$rfkill(0xffffffffffffffff, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) write$rfkill(0xffffffffffffffff, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) write$rfkill(0xffffffffffffffff, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) write$rfkill(0xffffffffffffffff, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:00 executing program 0: write$rfkill(0xffffffffffffffff, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:00 executing program 0: write$rfkill(0xffffffffffffffff, 0x0, 0x0) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:00 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:00 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:00 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:00 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:00 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:00 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x3c, r6, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}]}, 0x3c}}, 0x4000) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x43b4de75a296c87d}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3ff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) socket$nl_generic(0x10, 0x3, 0x10) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffb000/0x2000)=nil) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000800)={'erspan0\x00', r5, 0x40, 0x10, 0x40000000, 0x100, {{0x33, 0x4, 0x3, 0x0, 0xcc, 0x65, 0x0, 0x1f, 0x29, 0x0, @loopback, @multicast2, {[@generic={0x44, 0x6, "587a84f5"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x0, 0xd, "fb5a69c520c729444d830f"}, {0x7, 0xc, "878f159d53179bcbef16"}, {0x0, 0xd, "9b2d54fca46da710d3382b"}, {0x7, 0x3, 'N'}, {0x6, 0x3, "db"}]}, @rr={0x7, 0x17, 0x11, [@remote, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @multicast1]}, @lsrr={0x83, 0xb, 0xf8, [@remote, @private=0xa010100]}, @generic={0x94, 0x2}, @lsrr={0x83, 0x13, 0x5d, [@empty, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x4}, @remote]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0x2, [0x9, 0xc0c6, 0x5, 0x2, 0x1ff, 0x9]}, @rr={0x7, 0x27, 0xa8, [@remote, @multicast2, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0x24}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x21}, @remote]}]}}}}}) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004010}, 0x20040001) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r4) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) fsmount(r0, 0x0, 0xfc) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x5c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40805}, 0x24000010) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) write$rfkill(r0, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) fsmount(r0, 0x0, 0xfc) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) write$rfkill(r0, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) accept$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000580)=0x14) 04:32:01 executing program 1: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$rfkill(r0, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:01 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:01 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) 04:32:01 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 5: setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) 04:32:01 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:01 executing program 4: pipe2(0x0, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:01 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) 04:32:01 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:01 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:01 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:02 executing program 4: pipe2(0x0, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$rfkill(r0, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 2 (fault-call:0 fault-nth:0): getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:02 executing program 4: pipe2(0x0, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:02 executing program 3: pipe2(0x0, 0x4000) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) [ 144.912455][T29281] FAULT_INJECTION: forcing a failure. [ 144.912455][T29281] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 144.925673][T29281] CPU: 0 PID: 29281 Comm: syz-executor.2 Not tainted 5.13.0-rc5-syzkaller #0 [ 144.934449][T29281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.944627][T29281] Call Trace: [ 144.947906][T29281] dump_stack+0x137/0x19d [ 144.952243][T29281] should_fail+0x23c/0x250 [ 144.956659][T29281] should_fail_usercopy+0x16/0x20 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x40800, 0x0) 04:32:02 executing program 3: pipe2(0x0, 0x4000) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) [ 144.961768][T29281] _copy_to_user+0x1c/0x90 [ 144.966302][T29281] simple_read_from_buffer+0xab/0x120 [ 144.971784][T29281] proc_fail_nth_read+0xf6/0x140 [ 144.976929][T29281] ? rw_verify_area+0x136/0x250 [ 144.981807][T29281] ? proc_fault_inject_write+0x200/0x200 [ 144.987496][T29281] vfs_read+0x154/0x5d0 [ 144.991667][T29281] ? __fget_light+0x21b/0x260 [ 144.996399][T29281] ? __cond_resched+0x11/0x40 [ 145.001093][T29281] ksys_read+0xce/0x180 [ 145.005287][T29281] __x64_sys_read+0x3e/0x50 04:32:02 executing program 4: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:02 executing program 1 (fault-call:0 fault-nth:0): fsmount(0xffffffffffffffff, 0x0, 0xfc) [ 145.009806][T29281] do_syscall_64+0x4a/0x90 [ 145.014265][T29281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.020188][T29281] RIP: 0033:0x41935c [ 145.020205][T29281] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 145.043834][T29281] RSP: 002b:00007f200a7c9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 145.052347][T29281] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fec000/0x11000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000400)="145fdc755ed2bd9793c92fce1657564dda462c687be8", 0x16, r0}, 0x68) [ 145.060329][T29281] RDX: 000000000000000f RSI: 00007f200a7c91e0 RDI: 0000000000000003 [ 145.069549][T29281] RBP: 00007f200a7c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.078494][T29281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.086584][T29281] R13: 00007ffdfccabf2f R14: 00007f200a7c9300 R15: 0000000000022000 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:02 executing program 3: pipe2(0x0, 0x4000) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 4: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) write$rfkill(r3, &(0x7f00000003c0)={0x362, 0x1, 0x1, 0x1}, 0x8) 04:32:02 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) [ 145.119728][T29302] FAULT_INJECTION: forcing a failure. [ 145.119728][T29302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.135445][T29302] CPU: 0 PID: 29302 Comm: syz-executor.1 Not tainted 5.13.0-rc5-syzkaller #0 [ 145.144253][T29302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.154322][T29302] Call Trace: [ 145.157605][T29302] dump_stack+0x137/0x19d [ 145.162023][T29302] should_fail+0x23c/0x250 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) [ 145.166448][T29302] should_fail_usercopy+0x16/0x20 [ 145.171588][T29302] _copy_to_user+0x1c/0x90 [ 145.176030][T29302] simple_read_from_buffer+0xab/0x120 [ 145.181521][T29302] proc_fail_nth_read+0xf6/0x140 [ 145.186503][T29302] ? rw_verify_area+0x136/0x250 [ 145.191401][T29302] ? proc_fault_inject_write+0x200/0x200 [ 145.197071][T29302] vfs_read+0x154/0x5d0 [ 145.201245][T29302] ? selinux_capable+0x34/0x40 [ 145.206018][T29302] ? security_capable+0x91/0xa0 [ 145.210961][T29302] ? __fget_light+0x21b/0x260 [ 145.215652][T29302] ? __cond_resched+0x11/0x40 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) [ 145.220332][T29302] ksys_read+0xce/0x180 [ 145.224604][T29302] __x64_sys_read+0x3e/0x50 [ 145.229177][T29302] do_syscall_64+0x4a/0x90 [ 145.233607][T29302] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.239513][T29302] RIP: 0033:0x41935c [ 145.243411][T29302] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) [ 145.263152][T29302] RSP: 002b:00007ff225f61170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 145.271674][T29302] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 145.279728][T29302] RDX: 000000000000000f RSI: 00007ff225f611e0 RDI: 0000000000000003 [ 145.288693][T29302] RBP: 00007ff225f611d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.296782][T29302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.304760][T29302] R13: 00007ffc6dd1ffbf R14: 00007ff225f61300 R15: 0000000000022000 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r2, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r3 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) write$rfkill(r1, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 4: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x2, 0xfc) 04:32:02 executing program 2: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000012c0)={&(0x7f0000001340)=@getpolicy={0x1148, 0x15, 0x200, 0x70bd26, 0x25dfdbfe, {{@in6=@dev={0xfe, 0x80, '\x00', 0x38}, @in=@rand_addr=0x64010102, 0x4e22, 0x0, 0x4e20, 0x0, 0x2, 0x80, 0x120, 0x32, r0, 0xee01}, 0x0, 0x3}, [@offload={0xc, 0x1c, {0x0, 0x2}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd29, 0x70bd2a, 0x70bd2b, 0x70bd25, 0x7fffffff, [0xffffffff]}}, @srcaddr={0x14, 0xd, @in=@local}, @algo_auth_trunc={0x108d, 0x14, {{'cbcmac(aes)\x00'}, 0x8208, 0xa0, "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"}}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@local, 0x2, 0x8, 0x2}}]}, 0x1148}, 0x1, 0x0, 0x0, 0x4000001}, 0x80) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/152) 04:32:02 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:02 executing program 3: pipe2(&(0x7f0000000100), 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x1000000, 0xfc) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) r2 = fsmount(r0, 0x0, 0xfc) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000340)="4b91ffc438a6aa4e2f07123a7e2f61de", 0x10) 04:32:02 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:02 executing program 3: pipe2(&(0x7f0000000100), 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 4 (fault-call:1 fault-nth:0): pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x2000000, 0xfc) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x200c0014) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) fsmount(r0, 0x0, 0xfc) [ 145.578271][T29368] FAULT_INJECTION: forcing a failure. [ 145.578271][T29368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.591399][T29368] CPU: 0 PID: 29368 Comm: syz-executor.4 Not tainted 5.13.0-rc5-syzkaller #0 [ 145.600171][T29368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.610305][T29368] Call Trace: [ 145.613587][T29368] dump_stack+0x137/0x19d [ 145.617934][T29368] should_fail+0x23c/0x250 [ 145.622398][T29368] should_fail_usercopy+0x16/0x20 04:32:02 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000440)=0x14) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/230, 0xe6) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x1, 0x9, 0x301, 0x0, 0x0, {0xa}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1d}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5477}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x6008d84dd3890ba7) r2 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000240)="a19ae4af6f8c6778cb35adfa931f6ea27534de753305a03e520ebd15c81019937a8451", 0x23, r2}, 0x68) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x1c}}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r1, 0x1, 0x8, 0x0, 0x8000, {{0x9, 0x4, 0x1, 0x16, 0x24, 0x68, 0x0, 0x6, 0x2f, 0x0, @loopback, @rand_addr=0x64010102, {[@generic={0x84, 0xd, "327cb38b4e1d969a0bb7de"}]}}}}}) [ 145.627454][T29368] _copy_to_user+0x1c/0x90 [ 145.631879][T29368] simple_read_from_buffer+0xab/0x120 [ 145.637291][T29368] proc_fail_nth_read+0xf6/0x140 [ 145.642235][T29368] ? rw_verify_area+0x136/0x250 [ 145.647102][T29368] ? proc_fault_inject_write+0x200/0x200 [ 145.652766][T29368] vfs_read+0x154/0x5d0 [ 145.656939][T29368] ? selinux_file_ioctl+0x8e0/0x970 [ 145.662147][T29368] ? __fget_light+0x21b/0x260 [ 145.666826][T29368] ? __cond_resched+0x11/0x40 [ 145.671501][T29368] ksys_read+0xce/0x180 04:32:02 executing program 3: pipe2(&(0x7f0000000100), 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000380)={0xa68c, 0x6, 0x1, 0x1}, 0x8) 04:32:02 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) [ 145.675666][T29368] __x64_sys_read+0x3e/0x50 [ 145.680210][T29368] do_syscall_64+0x4a/0x90 [ 145.684672][T29368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.690606][T29368] RIP: 0033:0x41935c [ 145.694496][T29368] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 145.714483][T29368] RSP: 002b:00007f0edfd42170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 04:32:02 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, 0x0, 0x0) 04:32:02 executing program 1: fsmount(0xffffffffffffffff, 0x100000000000000, 0xfc) 04:32:02 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) [ 145.722913][T29368] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 145.731000][T29368] RDX: 000000000000000f RSI: 00007f0edfd421e0 RDI: 0000000000000005 [ 145.739348][T29368] RBP: 00007f0edfd421d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.747376][T29368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.755403][T29368] R13: 00007ffd751621ef R14: 00007f0edfd42300 R15: 0000000000022000 04:32:03 executing program 0 (fault-call:0 fault-nth:0): sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) [ 145.849019][T29406] FAULT_INJECTION: forcing a failure. [ 145.849019][T29406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.862107][T29406] CPU: 0 PID: 29406 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 145.870882][T29406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.880967][T29406] Call Trace: [ 145.884676][T29406] dump_stack+0x137/0x19d [ 145.889056][T29406] should_fail+0x23c/0x250 [ 145.893519][T29406] should_fail_usercopy+0x16/0x20 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, 0x0, 0x0) 04:32:03 executing program 1: fsmount(0xffffffffffffffff, 0x200000000000000, 0xfc) 04:32:03 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req={0x3f, 0xffffffff, 0x80000001, 0x9}, 0x10) 04:32:03 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) pipe2(&(0x7f0000000100), 0x4000) [ 145.898575][T29406] _copy_to_user+0x1c/0x90 [ 145.903103][T29406] simple_read_from_buffer+0xab/0x120 [ 145.908500][T29406] proc_fail_nth_read+0xf6/0x140 [ 145.913444][T29406] ? rw_verify_area+0x136/0x250 [ 145.918307][T29406] ? proc_fault_inject_write+0x200/0x200 [ 145.924060][T29406] vfs_read+0x154/0x5d0 [ 145.928264][T29406] ? __fget_light+0x21b/0x260 [ 145.933336][T29406] ? __cond_resched+0x11/0x40 [ 145.938017][T29406] ksys_read+0xce/0x180 [ 145.942275][T29406] __x64_sys_read+0x3e/0x50 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, 0x0, 0x0) [ 145.946787][T29406] do_syscall_64+0x4a/0x90 [ 145.951225][T29406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.957159][T29406] RIP: 0033:0x41935c [ 145.961125][T29406] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 145.980763][T29406] RSP: 002b:00007f34b7c0c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 145.989262][T29406] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c 04:32:03 executing program 1: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x1f, 0x47, &(0x7f0000000000)="1b379378c73992dda49a59bfca7ecf586655cfa577f2344f566b63bbea825913f30a7c2fd730eff80063aaed8cef2c20a1cc0ab1ca4908024e63178cea8070f098bbb497479313"}) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:03 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x936ebd2547fb1c68}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x200c0014) 04:32:03 executing program 1: fsmount(0xffffffffffffffff, 0x1, 0x0) [ 145.997243][T29406] RDX: 000000000000000f RSI: 00007f34b7c0c1e0 RDI: 0000000000000003 [ 146.005244][T29406] RBP: 00007f34b7c0c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 146.013319][T29406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.021379][T29406] R13: 00007ffed8aa813f R14: 00007f34b7c0c300 R15: 0000000000022000 04:32:03 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x80010, r0, 0x5ebb1000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4011) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x7f, 0x5a, 0x4, 0x3c, @remote, @mcast1, 0x40, 0x8, 0x7, 0x7}}) 04:32:03 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x200c0014) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x2, 0x0) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, &(0x7f0000000380)={0x0, 0x6, 0x1, 0x1}, 0x8) 04:32:03 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:03 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x19c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffe77}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x111}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x400}]}, @TIPC_NLA_BEARER={0x2c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6a}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2dc}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40010}, 0x30) [ 146.128137][ T25] audit: type=1400 audit(1623299523.314:9): avc: denied { execute } for pid=29439 comm="syz-executor.2" path="pipe:[52708]" dev="pipefs" ino=52708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, &(0x7f0000000380)={0x0, 0x0, 0x1, 0x1}, 0x8) 04:32:03 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x4b47, 0x0) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0xffffffff00000000) 04:32:03 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x2, 0x0) 04:32:03 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80800) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='[#/.\xa8+\x00', &(0x7f0000000040)='./file0\x00', r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x8086, 0x7800, 0x1000, 0xffffffe0, {{0x1f, 0x4, 0x3, 0x1f, 0x7c, 0x67, 0x0, 0x7, 0x2f, 0x0, @loopback, @multicast1, {[@timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x5, [{@loopback, 0x1fc}, {@local, 0xffffff27}, {@loopback, 0xfc53}, {@private=0xa010101, 0x5}]}, @generic={0x7557f0493eef46e8, 0xd, "2bc3475454fc829266508d"}, @lsrr={0x83, 0xb, 0x40, [@dev={0xac, 0x14, 0x14, 0xa}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x94, 0x2}, @ra={0x94, 0x4, 0x9}, @lsrr={0x83, 0x7, 0x5e, [@remote]}, @timestamp_prespec={0x44, 0xc, 0xc0, 0x3, 0xc, [{@remote, 0xc6}]}, @lsrr={0x83, 0xf, 0xbc, [@private=0xa010100, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x16}]}, @end]}}}}}) 04:32:03 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x2, 0x0) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1}, 0x8) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x4b49, 0x0) 04:32:03 executing program 0: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffb000/0x4000)=nil) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000006, 0x8ad00666d071d897, r0, 0x9ebf5000) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x400, 0x39f0adf89faa8fef) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x4084) 04:32:03 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x2, 0x61, &(0x7f0000000000)="038be1b8f351e1f4cb5bb09f6740999ad943930d8ed7aba4cbfcea4b32d75caca2d4b5d54aaf7f73f9a470fde8c80a77cc31f0ac893dfdaffa1391cf95cf7c238b0918508ae5354fa54db223b6c6e468aa6661ca0d3feb607d95492cfcf04d3956"}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x407c02, 0x0) r2 = getuid() sendmsg$nl_xfrm(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=@migrate={0x11c, 0x21, 0x4, 0x70bd2b, 0x25dfdbfe, {{@in=@empty, @in=@multicast1, 0x4e20, 0x0, 0x4e23, 0x96cd, 0xa, 0x0, 0x0, 0x3a, 0x0, r2}, 0x6e6bc0}, [@tfcpad={0x8, 0x16, 0x7fffffff}, @replay_val={0x10, 0xa, {0x70bd2c, 0x70bd25, 0x7}}, @replay_thresh={0x8, 0xb, 0x4}, @policy={0xac, 0x7, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@broadcast, 0x4e22, 0x1f, 0x4e24, 0x2, 0x2, 0x20, 0xb0, 0x8, 0x0, 0xee00}, {0x6, 0x0, 0x6, 0x9, 0x53e, 0x1, 0x7ff}, {0x4e5, 0xffffffffffffff7f, 0x100000000, 0xaedc}, 0x2, 0x6e6bbd, 0x2, 0x1, 0x1, 0x2}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20004001}, 0x4000000) 04:32:03 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsmount(r0, 0x1, 0xfc) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$rfkill(r0, &(0x7f0000000380), 0x8) 04:32:03 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x2, 0x0) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000140)='nolazytime\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x1, 0x9, 0x101, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_STATUS={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004}, 0x4005) 04:32:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x240001, 0x0) fsmount(r0, 0x0, 0x83) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x8, 0x80, 0x7f, 0x3, {{0x22, 0x4, 0x0, 0x34, 0x88, 0x64, 0x0, 0x7, 0x6, 0x0, @multicast1, @rand_addr=0x64010101, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x23, 0xc, [@empty, @rand_addr=0x64010100, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x12}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @broadcast, @local]}, @timestamp={0x44, 0x18, 0x60, 0x0, 0x1, [0x9d, 0x204d, 0x7f, 0x5, 0x10000]}, @timestamp_addr={0x44, 0x1c, 0x8d, 0x1, 0xc, [{@rand_addr=0x64010100, 0x6}, {@multicast1, 0xfffffff8}, {@rand_addr=0x64010101, 0x1}]}, @timestamp_prespec={0x44, 0x14, 0x2b, 0x3, 0x5, [{@empty, 0x1}, {@multicast1, 0x3f}]}, @generic={0x89, 0x4, "b746"}]}}}}}) 04:32:03 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5421, 0x0) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 04:32:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x10200, 0x0) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x4008014) 04:32:03 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/143) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 04:32:03 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) getpeername$packet(r0, 0x0, 0x0) 04:32:03 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x1) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5450, 0x0) 04:32:03 executing program 1: sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x7, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0xff}]}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x10000000) r0 = fsmount(0xffffffffffffffff, 0x0, 0xfd) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000140)=""/169) 04:32:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x84c02, 0x12345}, 0x7) 04:32:03 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x541b, 0x0) 04:32:03 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x102, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x881) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000008c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000880)={&(0x7f0000000380)={0x4c8, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0xe0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49ad}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1e}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x348, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc23}, @TIPC_NLA_NODE_ID={0xdd, 0x3, "27e50ba36f3c2c03b626512003200001194bc805ebbe6491ad5bead858f99a2405ccf80e1acc0ee0e74320ddbb423db14c1d5f076d11d308c54710022a8dc42938e044f78bcc1fcc62e21671809afefadba15a1186d831e1fd1b9d255a2689d63848540159674fab69b07c81623dccfef98cccedda57e05c20386625969611b07723e84bad1a7217e84404e73e4a07b048d50272cb6e6b21a1732a89f440697f56139cd8953e773d842ac87caa6eb08d276c3712ed08c5cc6dfb92df5ba97035fa6e0afc0cee30f78e15951a158c1cee5c5076405ecc3d7583"}, @TIPC_NLA_NODE_ID={0xb, 0x3, "fe8351675d8c73"}, @TIPC_NLA_NODE_ID={0x87, 0x3, "c132ae919038a9449f76488353714cd00d25851aae261ca6a6e1a709f3d5c09f4c6adf46a21bc0e5e93d901c143865be3a8e29ee7e227892a283988b5148cf0a98e4b00e980e9c4c2d7404f2a552348804e340a72104456383328c34c514119328d8a0d5ac0de5c07559907fc61936679f976237f3b672b0a4f09c47ed30efdfda2b84"}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "10ee2d3776d9cd652542fae7ad0dca3cb51d1517a47ae64d286efdb26928"}}, @TIPC_NLA_NODE_ID={0x47, 0x3, "2399b9806b23e4a26034695748beec0102d4ecb714d1b9c72586e3ab581543849a9374158b1a3a8a354b7afdaf1a786db3ee433dcad8f5360be8202685145be6d79583"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xf3, 0x3, "2252b6d8d764c6a6abfffca60ce1a2d814c99ee1b68986b30d63ec835e4d2fd2998129dc2dc1d15f96878e12856a69c05abd4de78055721b51c339b2d1c6280abc987bcbbd622a4155cfe568a25f4816fd377590d95c0bbb3b2e9abf3f9d9f32982082464d967aa19c38ad3d986a183ceb6eebb1c7bab7b154fca15c47a6173a39889f997c82bcbb5d6e088149a3d70848d875508ad66e89427df43831540f0af2b9177fb143a20255bfe1d301fd2e1742313f108609b2f53e3647ea7542a4e7c3bd98b45c0c7df52839654b55645c115b285dc3f05c26bb218cd68e140891c5e6d760730e18e627648d2bd61de780"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "41e4255a370fca194325219c34493b7b08a997459f"}}]}, @TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "ea76392b36aa1f83827a2b0823c098a11528b9f059e00e2d42f15ed69bcb"}}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x44080}, 0x40020) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x981, 0xa45c, 0x7, 0x1, 0x2, 0x4b, 0x7fffffff, 0x10000}, &(0x7f0000000200)={0x9, 0xffffffffffff913c, 0xffffffffffffff7f, 0x2d0, 0x422, 0xfffffffffffffff8, 0x0, 0x8}, &(0x7f0000000240)={0xc295, 0x5, 0x0, 0x1, 0x3, 0x0, 0x2, 0x3}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x8]}, 0x8}) 04:32:03 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5451, 0x0) 04:32:03 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x84) 04:32:03 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:03 executing program 2: getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000080)=0x80) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="a7137f2e9a19d5ad1916bd62e1f354aee93886543bec87ad67396c84d7a078d6e64e00000000000000b6090094352fcae1f433fe2418eb982862b2a02b690337bac6850d3cdddfa207582ddddc3c13ea8e5da1463bb1d01bd008e8b226251e95cf4e6eba44b3f898064643adf6e41b12d7d369c793fc7180bb37ccd2d7b68bab3d9afc81d61959e83fb4daaff58cf731d3bd8a20a6fe53db78df15b47587c970151edeea5d9676129c90a7c513b34735d56b428482f1699ad25ec55149a8d69065209a2f8675d63ece87c6", @ANYRES16=0x0, @ANYBLOB="000229bd7000fbdbdf251000000008003200060000000500370001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0xc1, 0x7, 0x1ff, 0x48, @mcast2, @empty, 0x1, 0x8, 0x9000000, 0xff}}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000140)=0x101, 0x8a3fa7f, 0x2) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1b000000", @ANYRES16=r1, @ANYBLOB="100025bd7000fedbdf2504000000050030000000000008003900ff07000008003b0008000000"], 0x2c}}, 0x8000) 04:32:03 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:03 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:03 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xb0, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NODE={0x68, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "0570b2b965af10f974c3473391fd0f208ea49b492d243aff9635c696f47e874b"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xbebf}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x2010}, 0x4040000) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="74000000c169fefef0f74ccebbac7caf84d8a1aaab6f4abf03be49d3e43e5d6e3c9e3bb730b4f46c1dfc92b6e74de8c09df632bef452dcbc92ff01000000000000a2825d3f3954d7dd8b14065f0a4a49f6a262cfad3cb981349396fae9a39b80615993c82c7d6c6a9a6a5d7349851771f9fabc3fe1defd198755803f6dfdae923677d80de473dde4782187fcb9ceae8a48559b8dbc18468008b9dcb9d39a36a73ddc270096871f9201ae8bf5dd4306ecd116093cf03e8e7671d9c415b5cb0917", @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf2514000000200002800400040008000100080000000800020002000000080002009a0000004000078008000100030000000c00040005000000000000000c000400010001000000000008000100070000000c00040008000000000000000800010007000000"], 0x74}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:03 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5452, 0x0) 04:32:03 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x5c9100, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "a1640f930c2c2fa3", "aca9d8e033a11c136ba71f2c6b128310", "5406ccde", "a9f80db6fc10c3ba"}, 0x28) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:03 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:03 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/nfsv4', 0x101c00, 0x1) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r1, 0x20, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44}, 0x0) 04:32:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5460, 0x0) 04:32:04 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x39, 0x9, 0x7, 0x20, 0x0, 0x80000000, 0x70010, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0xc, 0xffff}, 0x140, 0x4, 0x7, 0x0, 0x1, 0x8001, 0x3, 0x0, 0xffffffff, 0x0, 0x80000001}, 0xffffffffffffffff, 0xb, r0, 0x8) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:04 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:04 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 04:32:04 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40049409, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r2, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x19}}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0xa16083c8fa5b5828}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2b}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, '\x00', 0x34}}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x74}}, 0x40000) r3 = syz_io_uring_setup(0x3a12, &(0x7f00000001c0)={0x0, 0xbc82, 0x2, 0x0, 0x111, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000280)) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x0, 0x201, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x3}, [@typed={0x8, 0x62, 0x0, 0x0, @fd=r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004000}, 0x40000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380), 0x20000, 0x0) readlinkat(r4, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/52, 0x34) 04:32:04 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, 0x0) 04:32:04 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0x7c) fsmount(r0, 0x0, 0x8) 04:32:04 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) sendto$packet(r1, &(0x7f0000000140)="80cb34746c702995c3bd488a7a48f84bf6fe5c8c33a6ab6e29efefed8808f73fa7d7d807034e376cb5b7fe04b1ea2aac218e4f7a25896660127b8f9ace5cfec6a124d1f7bb65261ca8b4c229eb9db86acd1f43d365832ab088a02ec612ec3a60f302d13995eb55473f0e1b97ef336018c9b7f8f28d096873dbd30b626675aef7d4c1ac6d7d0b6ef93cc7381c32bed52a9c1bb9ad97d959b5113a93144740873bda39f3e7d2c4600640a054cd2ef3e3520e2f459829bc639989ada5e8bf1b67d71cf433578c20e1d992", 0xc9, 0x0, &(0x7f00000000c0)={0x11, 0x19, 0x0, 0x1, 0x1f, 0x6, @local}, 0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) 04:32:04 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xb, 0x8, 0x5, 0x70bd2d, 0x25dfdbfe, {0x5, 0x0, 0x8}, [@typed={0x8, 0xa, 0x0, 0x0, @u32=0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x80) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40087602, 0x0) 04:32:04 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x2, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x214, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x138, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb5fb}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x748}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x79f2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'macsec0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x41800000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x4}, 0x800) 04:32:04 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10001}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x4004840) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x13c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x87400000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5c8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf1a8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x76b95072}]}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x41}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ea}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NODE={0x70, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x6a, 0x3, "d2e484a56301187b5103b54b3019c6f1584187ca0857e0e1b2d0aedb256b3fd25546ae75c9859b966976b471777306ac77fff7b7467eac679edcb1858cc8ccb3daf8e3c0d36a1a3e39fd14ebac483e61f9775c4d86a350bc24645a607e29d3cb946534a3a0b8"}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4810}, 0x8011) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, 0x6, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x8090}, 0x41) 04:32:04 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/input', 0x100, 0x12) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x81) 04:32:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x4008000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1f1e0000", @ANYRES32, @ANYBLOB="2201abaca7a5f409de090200000014000900fcb500000007000031bd47b791f3ab62"], 0x28}, 0x1, 0x0, 0x0, 0x20008801}, 0x8000000) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, 0x0) 04:32:04 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40087602, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) 04:32:04 executing program 1: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x4020940d, 0x0) 04:32:04 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 04:32:04 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40087602, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x2, 0x7, 0x6, 0x4}, {0x1, 0x8, 0x1, 0x3}, {0x100, 0xff, 0x9, 0x3ff}, {0xa834, 0x1, 0x4, 0x1}, {0x6, 0x3, 0x1, 0x7}]}, 0x10) 04:32:04 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/clockevents', 0x400000, 0x3f2) sendto$packet(r0, &(0x7f0000000040)="ae656a75a414b5c3503cd79029100768a6c327952623e221139673cbb849af4122d046a9b967f1892ca6b29aa601dd", 0x2f, 0x40001, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x3, 0x6, @broadcast}, 0x14) fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'tunl0\x00', 0x0, 0x700, 0x1, 0x11, 0x5, {{0x17, 0x4, 0x2, 0x6, 0x5c, 0x65, 0x0, 0x8, 0x2f, 0x0, @private=0xa010100, @rand_addr=0x64010102, {[@rr={0x7, 0x7, 0xf, [@loopback]}, @timestamp_addr={0x44, 0x24, 0x7d, 0x1, 0x5, [{@remote, 0x4}, {@broadcast, 0x2}, {@rand_addr=0x64010101, 0x2}, {@rand_addr=0x64010100, 0x8}]}, @timestamp_prespec={0x44, 0x1c, 0xf6, 0x3, 0x3, [{@multicast1, 0x8}, {@loopback, 0xfffffffe}, {@broadcast, 0x20}]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="340000000f06010100000000000000000a0000090a000b00ffff0400000000000000f2d22c56c74e11eb07440026000000000006000b000300000006000b0004000000107f8ffa3032c19eb2c822481451a88a029bdfba3baf460379300be7de34e6e4c22ea72cc03f5ce84b30a18ff9e0b073e1a2abf50714683c20928d174c03c805ea5c6f0de1c3a04c25f290715a3bcdde98d216abf5f32d91435f8c5e8fad1f4b6c521e375c6078673659e57e868d516f6cd0b4b150defcf4fcaf91958aca6d714a093d503514a95b10adedfa"], 0x34}, 0x1, 0x0, 0x0, 0x24000000}, 0x4044001) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x80086601, 0x0) 04:32:04 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x541b, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x4010) 04:32:04 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x40087602, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80800) sendto$packet(r0, &(0x7f0000000000)="4c16fc89f68ef1a7d3d477d25fd619755c552fb17a3056bd1a9b24a3c28eeb877c1de260166b29661a89c289f45cfbcf5e9a5e88746d1aa27dc6246ac26b34fbdc23920200985b1fd360309d7959e1520439c27310eafc37d7d5b21f4709692705e2c6aae88edd121a02de43e6d8ed2d31e423915c7860646a4721c328ca28a4d792055b3551a0b2e1ff4604f8583dc54843f1083392f15d4f22c5b5a8d44eed7b7ba582b8d6acf57276a3c9b4d4bf2e7bb088d790b8215b55a50752b183dfde1e43f125a8cfd7505942e16cb62031d130c67e4f215063fa62a9ed62abc8da1e7d1f8ee6d8f75f8bc97b4b9cf135", 0xee, 0x20044004, &(0x7f0000000180)={0x11, 0xf6, r2, 0x1, 0x91, 0x6, @broadcast}, 0x14) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x80087601, 0x0) 04:32:04 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x80086601, 0x0) 04:32:04 executing program 0: r0 = getpid() getpgrp(r0) ptrace$peeksig(0x4209, r0, &(0x7f0000000000)={0xd70, 0x1, 0x2}, &(0x7f0000000040)=[{}, {}]) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:04 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/134) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:04 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000001880), 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x801c581f, 0x0) 04:32:04 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x80086601, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x801) 04:32:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 04:32:04 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x80086601, 0x0) 04:32:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc0045878, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xc8, 0x80, 0xd4, 0x4, 0x0, 0x9, 0x20010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa28, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x43400, 0x6, 0x36, 0x0, 0x2, 0x80000001, 0xfff7, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x9) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) syz_io_uring_setup(0x5155, &(0x7f00000000c0)={0x0, 0xf116, 0x8, 0x3, 0x1b7, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 04:32:04 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000015c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001580)={&(0x7f0000000140)={0x1428, 0x6, 0x8, 0x801, 0x70bd2a, 0x25dfdbfc, {0xc, 0x0, 0x1}, [@generic="0b890e1479aaf323a0dc2be70b893c9c6afaf22a05829a8ed5f94d9b05f9f00e7d9f436593514121917fce9f613738972e874bae4506d45606e018c7edd2a59e7d836a7c2bc657b9f3c55d34", @nested={0x139c, 0x7c, 0x0, 0x1, [@generic="d8c62885242c970e4f5ff7c00c1e70d1d637534a179dcb47291830cf79b93058fa183d73d7", @typed={0x14, 0x28, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @typed={0xb2, 0x3a, 0x0, 0x0, @binary="c1ecf4421bf5ee53177e51d0c27e36557ef2e93eee75f4f1b4c2ddfe8353c057c4be9c1953f868c436bf7fe12f8877897a7145a7b1d6056344cb486870c12e32ace24355e92c488e719d63b98d4530f8b125ff0fe02c070146a09615ebdbf001671fa45a3377e0d0ee36c628ce6a5f351c7be2457fa6184d979e46f22cb0ff95ae9dc2679bca704c2e551c70596cc60d05f7d61aa76178d8146bc295f62ad01583912f1d565f75973e8da318fe9a"}, @generic, @generic="7e0fe7e97de2f6540d384c54e7e8d9cfe77766807b4ec0d25415b329efa12374b99aae88231f0248f78f68ea106f21a73baa97eb4d98d29c4492bb95128fbe6e26c9767c3170286b6f4ea5a82c3e206e2b050207cae6f39c036f5cb05212803829573c0856a4d1fa91c1", @generic="a13c583ee7818d9ba97fa076c1faf31385def8d93a22e985024eb4351282ecd66b3231b9a3bbf8e050fd9b38c8669cee6176e5861d5e599a27694a4428527b3a8c29007b9c40aa56f6855feb9db8b1502641f0f0fa381fb29aef38ac8f05fd0e198352d6400aa7d6e8a0f37f6ed867ec93cd1f8440f9567fdd8678f77a85f1da76e8cc8dcfd8a3f182bbca268a5e541e22ba8f8480f9cbc213e574d23f800cf4812abdf38d24609470069731381f57dd238444cadaa26c0315dc96cba2b0b923dfb0a014fc", @generic="644194c7c62fca2249064f2e8759dcf222eed97d5c5aa968b72e3bf29046a24289291b31cc83fd746e129c268a1cb330faa11874c998e1d57fa98f87884ffd157515a2d1c914a038636c83815718500655d9d89b8fff6dcb9262929d379cbf49108f546bb3c99557417e608e2bdee75a5f1cab5d24bda9b8e450c9fd046e2e1b185dbfc836119069af801ab43e7a3f2daab6dc23a939d205498e0627af7a1a4e3b1179b31ed5acaee51ee796a28973179816d3a061b12d5119dc5b9022a3b2e4c50d7f2a1c7a94d1067de9122e66ee8fcd73bd31452eb88796", @generic="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", @generic="01291b6489be1463ad7385120be3495115a5bcc846d6b3dda0d69b65aabe3a53826888bac4a7ff6187dc113778cd8604d99393d3ac3a97dbdf6428a62f0586ba3937bc834db871c4120b613ee417ebfaab0af1978e9cc3cafb26ce701151d48efc780b6d3c662347a7cc24b5959f61052b4fce26af0d2866c045d214f46ff13ae95d884db6c10ae869d0126ab2fdb58632f42778bafd25ae831dab6cfc960d", @typed={0x4}]}, @typed={0xc, 0x89, 0x0, 0x0, @u64=0x5}, @typed={0xc, 0x1d, 0x0, 0x0, @u64=0x7fffffff}, @typed={0xc, 0x91, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x93, 0x0, 0x0, @fd=r0}]}, 0x1428}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x10, 0x40, 0x3, 0x56, {{0x18, 0x4, 0x3, 0x2, 0x60, 0x68, 0x0, 0x1f, 0x4, 0x0, @local, @broadcast, {[@cipso={0x86, 0xb, 0x0, [{0x5, 0x5, "dc634d"}]}, @timestamp_addr={0x44, 0x24, 0x4f, 0x1, 0x0, [{@dev={0xac, 0x14, 0x14, 0xc}, 0x2}, {@loopback, 0x7}, {@multicast2, 0x8}, {@broadcast, 0x3ff}]}, @generic={0x86, 0x7, "edbb366ddb"}, @timestamp={0x44, 0x14, 0x45, 0x0, 0xa, [0x6af, 0x7, 0x400, 0x81]}]}}}}}) 04:32:04 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:04 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0x84) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)=':@\x94.', 0x0, r2) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc0045878, 0x0) 04:32:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:04 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:04 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x40880) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000080)={'ip_vti0\x00', 0x0, 0x40, 0x7, 0x9, 0xbf78, {{0x6, 0x4, 0x1, 0x23, 0x18, 0x68, 0x0, 0x1, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x3, 0x16}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002cbd7000fedbdf25060000000500380001000000050029000100000008000300", @ANYRES32=r2, @ANYBLOB="05002a000000000004000000", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000810) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc0189436, 0x0) 04:32:04 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:04 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:04 executing program 2: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="eecb549b5749529912474da11f3c7b39", 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x208140, 0x0) sendto$packet(r1, &(0x7f00000002c0)="ce8bfa3bdcef1b5058c85073a508440e62741cc9c8d4fd0ad70b66673b01abb32a785e8c4884110b6d23f4a225839ae88804cb92b4c69afa300d4789e71409092454c91d5788540f1954e8860605ff2a43e601151796202666541a1b62f542ebeb80d38ebd049e3a1a41", 0x6a, 0x20000004, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x10, r1, 0xe054a000) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x280104, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000080)={0x53, 0x800, 0x5b1, {0x2, 0x7}, {0xfffe, 0x3}, @const={0x800, {0x401, 0x2, 0x72b9, 0x1}}}) readlinkat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)=""/214, 0xd6) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x64, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x43}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @FOU_ATTR_TYPE={0x5, 0x4, 0x6}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_TYPE={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x200000c1}, 0x4000010) 04:32:04 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21000020}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7f}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 04:32:04 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc020660b, 0x0) 04:32:04 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00') 04:32:05 executing program 5: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:05 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x498000, 0x0) recvfrom$packet(r2, &(0x7f0000000140)=""/131, 0x83, 0x2002, &(0x7f0000000080)={0x11, 0x1a, 0x0, 0x1, 0x81, 0x6, @random="cb7b96549ba7"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0x7f, 0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm, @timestamp, @sack_perm, @mss={0x2, 0x40000000}, @sack_perm], 0x5) pipe2(&(0x7f0000000340), 0x4800) sendmsg$nl_xfrm(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@delpolicy={0x5c, 0x14, 0x10, 0x70bd28, 0x25dfdbfe, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x4e24, 0x100, 0x4e20, 0x9, 0x2, 0x0, 0x80, 0x2e}, 0x6e6bb1, 0x2}, [@mark={0xc, 0x15, {0x35075d, 0x5}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8800}, 0x800) 04:32:05 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x10201, 0x0) 04:32:05 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:05 executing program 1: fsmount(0xffffffffffffffff, 0x1, 0x0) 04:32:05 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r1) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x190, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_BEARER={0x140, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x69}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x2, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @private=0xa010101}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5d24}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}]}]}, 0x190}}, 0x4000000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:05 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, 0x0, 0x822, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400000}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffbff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe879}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x60, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdd7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040081}, 0x80) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r2, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000680)={&(0x7f0000000300)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="001427bd7000fbdbdfb3bdd9627f54638700", @ANYRES32=r0, @ANYBLOB="08000b000500000008000b00000000000a000900000000000000000008003a0044f5000008002b000200000008003b0021f31c38"], 0x50}, 0x1, 0x0, 0x0, 0x20000010}, 0x20048000) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x54, 0x6, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x4}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4002}, 0x10) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc0000) r4 = getuid() ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl1\x00', r0, 0x29, 0x8d, 0x1, 0xfffffff9, 0x22, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x20, 0x1f, 0x5}}) sendmsg$nl_xfrm(r3, &(0x7f0000000640)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)=ANY=[@ANYBLOB="a80100001700080028bd7000fedbdf25ac1414bb000000000000000000000000000004d52b000000fe8000000000000000000000000000aaac1414aa000000000000000000000000fe8000000000000000000000000000324e2300064e2000000200204032000000", @ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="00000000000000000000ffffac14142dac1414bb0000000000000000000000004e2100914e2401000200c0b00c000000", @ANYRES32=r5, @ANYRES32=0xee00, @ANYBLOB="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"], 0x1a8}, 0x1, 0x0, 0x0, 0x20000006}, 0x10) 04:32:05 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000001c0)='batadv0\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='syztnl2\x00', &(0x7f0000000280)='\'!-\'#\x00'], 0x1000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000040)={'gretap0\x00', r1, 0x20, 0x8000, 0x98e3, 0x400, {{0x2d, 0x4, 0x1, 0x4, 0xb4, 0x68, 0x0, 0x2, 0x29, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x17}, {[@timestamp={0x44, 0xc, 0xa2, 0x0, 0x3, [0x5, 0x7]}, @cipso={0x86, 0x1c, 0x2, [{0x7, 0x3, '('}, {0x5, 0x9, "c28fb578ad9b3e"}, {0x6, 0xa, "5b9b87621f3511bc"}]}, @end, @noop, @timestamp_addr={0x44, 0x1c, 0x61, 0x1, 0x8, [{@rand_addr=0x64010100, 0x7f}, {@private=0xa010100, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @timestamp_prespec={0x44, 0x4c, 0x92, 0x3, 0x2, [{@rand_addr=0x64010102, 0xd6e9}, {@broadcast, 0x8}, {@multicast1}, {@empty, 0x1}, {@multicast2, 0x2}, {@remote, 0x1}, {@multicast2, 0x4b}, {@empty, 0x6}, {@remote, 0x9}]}, @noop, @rr={0x7, 0xb, 0x45, [@local, @empty]}]}}}}}) 04:32:05 executing program 1: fsmount(0xffffffffffffffff, 0x1, 0x7c) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x40d0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0xc4800) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) 04:32:05 executing program 3: pipe2(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:05 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000a80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000a40)={&(0x7f0000000200)={0x83c, 0x7, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFTA_RULE_EXPRESSIONS={0x7e0, 0x4, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8}, @NFTA_EXTHDR_SREG={0x8, 0x7, 0x1, 0x0, 0xb}]}}, @tproxy={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x17}]}}]}, {0x65c, 0x1, 0x0, 0x1, [@counter={{0xc}, @void}, @cmp={{0x8}, @val={0x42c, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_CMP_DATA={0x78, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x61, 0x1, "52b33fab0c79de8dcbc7cb271e1e178171135540c69b1f7056f245246cffc119383d98932d4356f5fe4172db17e23508e988e5a7ea983f81d70e4955f9d9627a958bbc8096cb49403227a66638adf295e27c29e86b788c5b051710bece"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_CMP_DATA={0x1b4, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0xbf, 0x1, "1906273677a493efb399b744e448ed36df4d876cc25a8790b5eda788719119a7c39da5afe0478e3dd2935deb2ce1f2b551783368157c01620ea86fe97927e61b12f93f91e8783b905b29bc32408ea9d816df511af046bf96ae597af01f5b1c5870bf577cdf843a8c897a363ab3711fd2a9df510d0ffd0e4ea3309eb4790ff081a6b0d7b90975212e52758f04678bac2d3122018741c78d509a684cd96d3d82757dfc9cc09d8f3f0123e7bfb67780f29f543e2bcf629a4d95dd8a6f"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x3686886bb757d037}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_CMP_DATA={0x1dc, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xa4, 0x1, "320cb5f16443ea8b21ccda3d3473b746f0ac6aa25322d2722161c7fed8fdbf88d0b398b5f6314680e11ce109bc62728bdd0e0b9287bdb4687aebdcd9b84e49c480c7c45b670677361af7143601308f9fc1e0df524721533c45f74f09d7ac6c1423e33cd757bd62131fb3600f6af3d5f608a42fe2ca50b91c56c85dfb538f66775b0c4ad048e240ddb5c9ee04422f819613cf86d39300460e1e0122e1fb9e1b09"}, @NFTA_DATA_VALUE={0xe6, 0x1, "e7b19d8d654e75655d3816a50cf834c9091f598d5262a46029d56ef7ced6b865bf5c5093249d273156ba5144ebffdd4b41d6a6463a8ebed631d8791dc07180d13b9b22d5ad5620f2e19a00182d9a8cbd11014a808eb14632745036f3e2c20c35f43047c89480df512302dabf9630279ff65cabf375ba8e4282b5553f509b40089be262a30778d5920734a9fe060d45fb98d12d0f4d040b43a43a182da973de612bf1eaf068d97679ecd80382ebac1a1e7df729b94b5361d19329ed56be69c2a67f4ae9a455c583f1313978776b1ed59a5fb4035c94f54b76aefedf364a6e2dd579f1"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x8, 0x1, "83737199"}]}]}}, @xfrm={{0x9}, @void}, @match={{0xa}, @void}, @osf={{0x8}, @void}, @numgen={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x80000000}]}}, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x581a9f1260396304}, @NFTA_HASH_SREG={0x8, 0x1, 0x1, 0x0, 0x16}]}}, @reject={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x3}, @NFTA_REJECT_ICMP_CODE={0x5}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @dynset={{0xb}, @void}, @match={{0xa}, @val={0x168, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0xa, 0x1, 'tunl0\x00'}, @NFTA_MATCH_NAME={0xc, 0x1, 'batadv0\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_MATCH_NAME={0x6, 0x1, ',\x00'}, @NFTA_MATCH_INFO={0x7c, 0x3, "3e1df4191fe4b8734fef05a99fc304f780c6181884d658f9128b9418a0abb1a22ec2427901ed102d62501c1b41d0e5655057bd018c0deac8d22ce13df4dc965e2c81af4ec52d35eabc37a734a51cb1e106b403115a500e94f2c9b7f353f8159d8237652de6a1103f6886abef39c58c1578b4b9e09f984e86"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_MATCH_NAME={0xd, 0x1, '/dev/vcs\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x143}, @NFTA_MATCH_INFO={0xa0, 0x3, "ede7676a48266e0f78ed37124c01b71a1b8e1a88994eb8984199ed8b3cff57cb7cc88282f6c6c141e2419687d238f5bd25cf35bd72b5e571464c0c666e06461d4286f3facd7e4e3eba08c3345b2790d0099750662b2a14a55a529157a833b5594ff0b8e6c1d7b14a99fd65f2f55042cd243ce4d464aa2c588f41f6f4de7be89befe661549339be86c349ce6dc327f33a1a27767b43b22a78c1c97623"}]}}]}, {0x10, 0x1, 0x0, 0x1, [@notrack={{0xc}, @void}]}, {0x1c, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @void}, @limit={{0xa}, @void}]}, {0x50, 0x1, 0x0, 0x1, [@dup_ipv6={{0x8}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xb}]}}]}, {0x64, 0x1, 0x0, 0x1, [@counter={{0xc}, @void}, @dup_ipv4={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xf}]}}, @tunnel={{0xb}, @void}, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}]}}]}, {0x10, 0x1, 0x0, 0x1, [@log={{0x8}, @val={0x4}}]}, {0x54, 0x1, 0x0, 0x1, [@rt={{0x7}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @payload={{0xc}, @void}]}]}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x22, 0x7, 0x1, 0x0, "f0efc4aa9eb5e9955441d643c4aed3e478b179f85f2b2d7e8217a62b7ce2"}]}, 0x83c}}, 0x44000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x12000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', r3, 0x7800, 0x10, 0xdb, 0xfffffffc, {{0x17, 0x4, 0x2, 0x24, 0x5c, 0x67, 0x0, 0x0, 0x2f, 0x0, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x31, 0x3, [{0x5, 0xb, "4dfa1e41f9e1c4bcea"}, {0x5, 0x10, "afbd2249e27f7f60a04adb33012f"}, {0x7, 0x3, "87"}, {0x0, 0xd, "184eca3c6634bd20c9698d"}]}, @end, @noop, @timestamp={0x44, 0x8, 0x65, 0x0, 0x5, [0x4]}, @rr={0x7, 0xb, 0x7e, [@remote, @empty]}]}}}}}) 04:32:05 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 2: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x1c, 0x0, 0x1, 0x1f, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xc}}, 0x14) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:05 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00@\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf250600000005002d00010000000a0009000180c20000010000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x20, 0x0) 04:32:05 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1, 0x6, @link_local}, 0x14) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 5: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x40087602, 0x0) 04:32:05 executing program 2: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, 0xa, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x6}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x80000001}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x1}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x37}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @masq={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x12}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}, 0x74}}, 0x440c5) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)={0x254, 0xa, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8}, @NFTA_SET_DESC={0x224, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x70, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8000}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x693afde6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3ff}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xfffffff8}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_DESC_CONCAT={0x1a0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xd8f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xbbc1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x74}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, {0x4c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4248}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fffffff}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x400}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xf669}, @NFTA_SET_FIELD_LEN={0x8}]}]}]}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x254}, 0x1, 0x0, 0x0, 0x40000}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000480)=""/232) 04:32:05 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x400c044}, 0x4040) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index, 0x0, 0x0, 0xfffffffd, 0xd, 0x1, {0x0, 0x0, r2}}, 0xfe80) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80000) 04:32:05 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 0: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x13, 0xffffffffffffffff, 0x10000000) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000000301050000000200000000000a000005080007400000040c000001802e200ae0dfd2558a786a44991e0ca3605ccea6ecc2fe4cd7a8f5116a855612a6873986042d11748cde9fc08d40623c7bbcbe96a1d1017cdb63b7bf9bbe47cff2834b0d641b2096550add3dd73e757562ac9071ba8ddb5c0c4594e4d0c0c23d6c3e5efeb9fdc95aea2f3027ccdf34f0da4c5d6ad3587d2da06ec16f3d35ea59ccb349bb60959b732586618114b65023270c"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20004815) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x301000, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, 0x1, 0x7, 0x3, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x32}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x4}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x48024}, 0x11) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000001}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x78, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3df5f5a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff9d0}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008044) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, 0xa, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_DESC={0x14, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x2}]}, @NFTA_SET_DATA_TYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x41}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000580)='eth\x00', 0x0, r2) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00@\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf250600000005002d00010000000a0009000180c20000010000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x20, 0x0) 04:32:05 executing program 3: pipe2(&(0x7f0000000100), 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x80086601, 0x0) 04:32:05 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) socketpair(0x5, 0x4, 0xde, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x5, 0x0, 0x1}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40080}, 0x811) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 04:32:05 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:05 executing program 1: fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f0000000080)='nolazytime\x00', 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='$)@}^%bW-}-\x00', &(0x7f0000000040)='./file0\x00', r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000001980), 0x800, 0x0) renameat(r1, &(0x7f0000001940)='./file0\x00', r2, &(0x7f00000019c0)='./file0\x00') sendmsg$OSF_MSG_REMOVE(r1, &(0x7f00000016c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001680)={&(0x7f0000000140)={0x1508, 0x1, 0x5, 0x401, 0x0, 0x0, {0x3, 0x0, 0x4}, [{{0x254, 0x1, {{0x2, 0x6}, 0x40, 0x5, 0x3, 0x8000, 0x12, 'syz1\x00', "ea473ced0520f14680484b5c5b5097a93ba49d158aa350f31f75f6df52d9e4a1", "30b28955c431a20b71a937cbcd3c23caf0fce578355c28cc607b0649100cf875", [{0x9, 0x7fff, {0x1, 0x2}}, {0x4, 0x51, {0x1, 0x65}}, {0x1, 0x6, {0x0, 0x6}}, {0x6ddd, 0x8, {0x3, 0x70}}, {0xffff, 0x24e, {0x2, 0x6}}, {0xfff9, 0x7fff, {0x0, 0x9e}}, {0x2, 0x9, {0x1, 0x9}}, {0x81, 0x4, {0x3, 0xffffffff}}, {0x6, 0x7fff, {0x2, 0x2}}, {0x4a, 0xff, {0x1, 0x2}}, {0x87e6, 0x8000, {0x2, 0x6}}, {0x81, 0x81, {0x0, 0x1ff}}, {0x80, 0x9, {0x0, 0x9}}, {0x0, 0x8a9, {0x3, 0x9}}, {0x7, 0x80, {0x2, 0xfffffff8}}, {0xae, 0x2, {0x1, 0x1}}, {0x8001, 0x40, {0x0, 0x3f}}, {0x9, 0x5, {0x2, 0x7}}, {0xb8, 0x40, {0x0, 0x6}}, {0x9, 0x7, {0x3, 0x9}}, {0x2, 0x800, {0x2, 0x7}}, {0x8000, 0x8001, {0x1, 0x3}}, {0x67, 0x38, {0x2, 0xfffffffb}}, {0x5, 0x200, {0x3, 0x4}}, {0x100, 0x101, {0x3, 0x9}}, {0x0, 0x30, {0x2, 0x493d29b7}}, {0x0, 0x163, {0x3, 0x400}}, {0x13, 0x6, {0x1, 0xfffffff7}}, {0x1000, 0x40, {0x2, 0x46e}}, {0x7, 0x2, {0x1, 0xffff4d91}}, {0x0, 0xff, {0x1, 0x4}}, {0x800, 0x5, {0x2, 0x2}}, {0x1f, 0x1, {0x1, 0x80000001}}, {0x2, 0xfb03, {0x1, 0x8001}}, {0x20, 0x51e6, {0x1, 0x6}}, {0x7, 0x9, {0x1, 0x1}}, {0x8, 0x68c, {0x2, 0x7}}, {0x2, 0x2, {0x2, 0x6}}, {0x3, 0x7f, {0x2, 0x9}}, {0x40, 0x0, {0x0, 0xffff}}]}}}, {{0x254, 0x1, {{0x2, 0x10000}, 0x1, 0x8, 0x6, 0x4, 0x1, 'syz1\x00', "e6a923b671cccffe76e3f0457cbf4b04bb9e73437d6b73ba386d1568ebdb7f52", "350f2dc93b04e5035f02b3a4e3485799c2f273c9cba64e401a1a3db946296971", [{0xe7, 0x8, {0x0, 0xc0000000}}, {0x0, 0x100, {0x1}}, {0x7, 0x5, {0x0, 0xbf18}}, {0x2, 0x1, {0x3, 0x3}}, {0x8000, 0x1, {0x1, 0x1}}, {0x40, 0x81, {0x2, 0x33}}, {0x5, 0x5, {0x1}}, {0x100, 0x9, {0x2, 0x1ff}}, {0x8, 0x8001, {0x1}}, {0x9, 0x1, {0x0, 0x2}}, {0x15, 0x101, {0x1, 0xad}}, {0xff01, 0x1ff, {0x1, 0x8}}, {0x6f0, 0xffff, {0x2, 0x6}}, {0x1ff, 0x4, {0x2, 0xa}}, {0x1, 0x21df, {0x0, 0x7}}, {0x6, 0x3ff, {0x2, 0x4}}, {0x200, 0x0, {0x0, 0x7}}, {0xd0, 0x1, {0x2, 0x6}}, {0x2, 0x3, {0x3, 0x6}}, {0x9, 0x6, {0x1, 0x8ef}}, {0x7fff, 0x1, {0x1, 0x90}}, {0x0, 0xf001, {0x0, 0x400}}, {0xa8a, 0x8, {0x2, 0x101}}, {0x3, 0xdca4}, {0xbea1, 0x96, {0x0, 0x8001}}, {0x4, 0x7c2, {0x2, 0x1}}, {0x1, 0xdb2e, {0x0, 0x1ff}}, {0xef6, 0x9, {0x2, 0x3}}, {0x0, 0xe8, {0x2, 0x8}}, {0x3, 0x6, {0x3, 0x8001}}, {0x3, 0x4ab2, {0x3, 0x55b}}, {0x3, 0x5, {0x1, 0x5}}, {0x3888, 0x81, {0x0, 0x3}}, {0x8001, 0xff01, {0x3, 0x3}}, {0x1, 0x35, {0x3, 0x8001}}, {0x9, 0x7, {0x1, 0x4a}}, {0x3, 0x40, {0x2, 0x2}}, {0x5, 0x8000, {0x2, 0xbca}}, {0x6, 0x0, {0x0, 0x7}}, {0x9, 0xb6, {0x3, 0x8}}]}}}, {{0x254, 0x1, {{0x0, 0x9}, 0xf6, 0x1, 0x2, 0x19f, 0x28, 'syz0\x00', "21b47ee2864717560666aab0ccba890fb95e1e88a75e06a28d24209d62e83406", "404db00cddb5be09bcea433aae22a88f800b586a28d05aa14df399b0a82a725c", [{0x9, 0x5, {0x0, 0x7ff}}, {0x1, 0x2, {0x3, 0xa2}}, {0x8, 0x2, {0x1, 0xff}}, {0x7, 0xdc7, {0x3, 0xff}}, {0x8, 0x8, {0x2, 0x2}}, {0x1, 0x5d, {0x3, 0x3}}, {0x80, 0xffff, {0x2, 0x873}}, {0x5, 0x1, {0x3}}, {0x80, 0x3, {0x2}}, {0x7, 0x2, {0x1, 0x9}}, {0xff, 0x8, {0x3, 0x2}}, {0x8, 0x2, {0x2, 0x8}}, {0x0, 0x8, {0x2, 0x6}}, {0x7, 0xde8b, {0x1, 0x9}}, {0x3, 0x400, {0x0, 0x3ff}}, {0x5, 0x7fd, {0x0, 0x1}}, {0xae, 0x34, {0x1, 0x5}}, {0x0, 0x1f, {0x1, 0x10000}}, {0x5, 0x8af5, {0x0, 0xfffffffb}}, {0x8362, 0x6, {0x2, 0x4efe}}, {0xfff7, 0xae, {0x2, 0x4}}, {0x9, 0x0, {0x3, 0x9}}, {0xfff, 0xf000, {0x1, 0x6c3a5952}}, {0x1f, 0x6298, {0x2, 0x1}}, {0x0, 0x100, {0x3, 0x5}}, {0x9, 0x3, {0x0, 0x2}}, {0x8, 0xff, {0x1, 0x80000000}}, {0x400, 0x7ff, {0x3, 0x8c}}, {0x63, 0x0, {0x0, 0x7}}, {0x8, 0x9, {0x1}}, {0x7, 0x8, {0x0, 0x2}}, {0x1ff, 0x8, {0x1, 0x3f}}, {0x7, 0x7527, {0x1, 0x7}}, {0xf800, 0x366, {0x1, 0xb44a}}, {0x3, 0x40, {0x2}}, {0x5d14, 0x1, {0x2, 0x4}}, {0x26c, 0x2, {0x1, 0xdba0}}, {0x0, 0x8, {0x1, 0x61}}, {0x8, 0x2, {0x1, 0x4}}, {0x1, 0x9, {0x2, 0x9}}]}}}, {{0x254, 0x1, {{0x1, 0x6636}, 0x7, 0x20, 0x1a, 0x2, 0x23, 'syz0\x00', "88bfc917db50512940ac6037ff2c43766519087199ab90715659a206b5751232", "8910b1d9aa6f306bd841aff672e40c34a1a888ad25aab35532c2c8b7bd96999b", [{0x9, 0x2, {0x3, 0x401}}, {0x0, 0x7, {0x3, 0x89c}}, {0x6, 0x4, {0x3, 0x3}}, {0x6, 0x8, {0x0, 0xfff}}, {0xfff7, 0x7c5, {0x0, 0x2}}, {0x7, 0x1, {0x2, 0x4}}, {0x7f, 0x81, {0x0, 0x9}}, {0x3, 0xc6, {0x2, 0x4}}, {0x3328, 0x3, {0x0, 0x6}}, {0x8, 0x81, {0x2, 0x401}}, {0x8, 0x6, {0x0, 0x4}}, {0x3ff, 0x101, {0x1, 0x2}}, {0xb147, 0x3, {0x3, 0x7}}, {0x7, 0x6, {0x1}}, {0x8, 0x0, {0x3, 0xfffffffa}}, {0x7, 0xe5c6, {0x3}}, {0x1000, 0x1000, {0x1, 0x2}}, {0x401, 0x8, {0x0, 0xff}}, {0x4, 0x8000, {0x3, 0x7}}, {0xef, 0x7, {0x2, 0x6}}, {0x0, 0x7, {0x2, 0x3}}, {0x1, 0x4, {0x0, 0x8e2}}, {0xc22, 0x4, {0x1, 0x1}}, {0xff, 0x9, {0x1, 0x5}}, {0x864, 0x5, {0x3, 0xdd3060f}}, {0x0, 0x1fe, {0x3, 0x100}}, {0x1, 0x9, {0x3, 0x9}}, {0xf6db, 0x79e6, {0x0, 0x40d}}, {0xfcd, 0xdd, {0x3, 0x374b2c72}}, {0x9, 0x6, {0x3, 0x5}}, {0x4, 0x0, {0x3, 0x7}}, {0x8, 0x200, {0x1, 0x800}}, {0x7fff, 0xfe0, {0x3, 0x3}}, {0x3, 0xe4a, {0x1, 0x9}}, {0x95c, 0x7c, {0x1, 0x20200000}}, {0x8, 0x20, {0x2, 0xfffffffe}}, {0x2, 0x1f, {0xa45e526dfbc0512a, 0x1c000000}}, {0x401, 0x1ff, {0x1, 0x9}}, {0xfff, 0xb43, {0x1, 0x1f}}, {0x7ff, 0x84, {0x3, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0x10000}, 0x1, 0x20, 0x546, 0x1f, 0x27, 'syz0\x00', "d2d82129a3c494fb146407d6bf26b63379721b174d9974e5b498df7602ce736d", "4defd486bf48a9b1c9944b42f93abbf74a9a90477f634ef03d695d42a0048b6b", [{0x6f, 0x9, {0x0, 0x1000}}, {0x7, 0x3672, {0x0, 0x400}}, {0x64, 0xf59, {0x2, 0x4}}, {0x2, 0x1, {0x1, 0x101}}, {0x8001, 0x1f, {0x1, 0x1ff}}, {0x5, 0x81, {0x3, 0x6}}, {0xb0e, 0x2, {0x1}}, {0x815, 0x3, {0x1, 0x10000}}, {0x5, 0x7, {0x3, 0x95}}, {0x1000, 0x8a1, {0x2}}, {0x6, 0x3, {0x2}}, {0x5, 0x4, {0x2, 0x20000000}}, {0x401, 0x9, {0x2, 0x8}}, {0x5, 0x7ffe, {0x1, 0xfffffffc}}, {0x9, 0x7f, {0x3, 0x519}}, {0x8, 0x6, {0x76e871148f8fb2b2, 0x1f}}, {0x5, 0xffef, {0x3, 0x6f8}}, {0x0, 0x4, {0x1, 0x5}}, {0x7, 0x1ff, {0x3, 0x4}}, {0x5, 0x8, {0x1, 0x8000}}, {0xec, 0x0, {0x1, 0xb4}}, {0x3, 0x2, {0x2, 0x80}}, {0xfffe, 0x3, {0x3, 0x1ff}}, {0x766b, 0x4, {0x5}}, {0x200, 0x3, {0x2, 0x20}}, {0x5, 0x5, {0x3, 0x4}}, {0x7, 0x2, {0x3, 0x3}}, {0x6, 0x18, {0x2, 0x5}}, {0x5, 0x0, {0x3, 0x6}}, {0x12, 0x20, {0x2, 0x9}}, {0x1f, 0x800, {0x3, 0x1000}}, {0x0, 0x4, {0x2, 0x4}}, {0x0, 0x674, {0x1, 0x800}}, {0x7f, 0x76, {0x0, 0x8}}, {0x9, 0x1943, {0x3, 0xffffffcd}}, {0x8, 0xfd9f, {0x0, 0x7fffffff}}, {0x800, 0x8092, {0x2, 0x5}}, {0xfffc, 0x1ff, {0x0, 0x9}}, {0x27, 0x4, {0x2, 0x1}}, {0xffff, 0x4, {0x1, 0x80000000}}]}}}, {{0x254, 0x1, {{0x2, 0xffff121e}, 0x0, 0x78, 0x18, 0x8e, 0x1c, 'syz1\x00', "a379b44ee7807d40a9cb72fd6cb305a690ece0ba6ecd265a0956132c3d2c8137", "543c3bdf895646429ab44a3cd4b897c11373167c1f42bf10dfbfdc374d2960c2", [{0xff00, 0xbce, {0x1, 0x2}}, {0xa8, 0x101, {0x3, 0x7fff}}, {0x7f, 0x7, {0x0, 0x5}}, {0x8, 0x4, {0x0, 0x9}}, {0x9, 0x7, {0x3, 0x401}}, {0x0, 0xdbe, {0x2, 0x6}}, {0x9eaf, 0x4, {0x3, 0x3}}, {0xfffd, 0x0, {0x1, 0x20000000}}, {0x4, 0x800, {0x0, 0xffffffff}}, {0x0, 0xdd, {0x3, 0x1ff}}, {0x6, 0xd1cf, {0x3, 0xc8}}, {0x0, 0x6, {0x3, 0x40}}, {0x4, 0xfffb, {0x3, 0x7fff}}, {0x5, 0x2, {0x3, 0x7}}, {0x8000, 0x6800, {0x1, 0x9}}, {0x7ff, 0x101, {0x2}}, {0x400, 0x8, {0x3, 0x1f}}, {0x9, 0x68d, {0x1, 0x4}}, {0xfffe, 0x40, {0x0, 0x7f}}, {0x8, 0xca, {0x0, 0x4}}, {0x3, 0x3, {0x0, 0x1000}}, {0x3, 0x3, {0x2, 0x7f}}, {0x5, 0x7, {0x0, 0x3}}, {0x0, 0x37, {0x0, 0x1ff}}, {0x1, 0x8, {0x2, 0x5}}, {0x100, 0x40, {0x3, 0x401}}, {0x0, 0x8000, {0x3, 0x6637}}, {0xfaee, 0x9, {0x2, 0x7ff}}, {0x5, 0x40, {0x2, 0xffffffff}}, {0x4, 0x0, {0x0, 0x80}}, {0x6, 0x800, {0x2, 0x7}}, {0xfff7, 0x3, {0x1, 0x3}}, {0x3, 0x200, {0x2, 0x2}}, {0xe4, 0x8, {0x3, 0x80000000}}, {0x80, 0x9, {0x2, 0x7}}, {0x7, 0x1f, {0x3, 0x5}}, {0x8b0c, 0x7, {0x1, 0x2}}, {0x9, 0x7ff, {0x0, 0x26}}, {0xfffe, 0x3, {0x3, 0x8001}}, {0x0, 0x9, {0x3, 0x7fa}}]}}}, {{0x254, 0x1, {{0x1, 0x6}, 0x2, 0x2, 0x2, 0x9, 0x1b, 'syz1\x00', "d813ed32e64b300e8e7c201bc4bd8ce3195c71847b70aaf94d9b2c9275304594", "5f9c1d44edda88908b174b18001e39bcfe0969be6e5b34aa862141efe768744b", [{0x5, 0x4, {0x1, 0x80000000}}, {0x7, 0x3f, {0x2, 0x819}}, {0x200, 0x9, {0x2, 0x8d5}}, {0x1ff, 0x8, {0x0, 0x1f}}, {0x9, 0x69, {0x2, 0xd59c}}, {0x0, 0x1f, {0x1, 0x4}}, {0x1, 0x0, {0x0, 0xfff}}, {0x8, 0x800, {0x2, 0x8}}, {0x8, 0x8, {0x2, 0xffffffff}}, {0x0, 0x1, {0x2, 0x447}}, {0x200, 0x480, {0x3}}, {0x40, 0x20, {0x0, 0xfffffff9}}, {0x6, 0xe03, {0x1, 0x4}}, {0x6, 0x1, {0x2, 0x3fb}}, {0x4, 0x2, {0x1, 0x8000}}, {0x8, 0xc66, {0x3, 0x3}}, {0x1c0, 0x400, {0x2, 0x7}}, {0x7ff, 0x77f, {0x3, 0xff}}, {0xd08, 0x6, {0x3, 0xffffffff}}, {0xff80, 0x7, {0x0, 0x3}}, {0x100, 0x5}, {0x8, 0x5, {0x2, 0x2}}, {0x7f, 0x3, {0x1, 0x8}}, {0x5, 0x0, {0x0, 0x7}}, {0x7, 0xa130, {0x1, 0x87}}, {0xf1, 0xde49, {0x24d67c534324d150, 0x101}}, {0x9, 0x7f, {0x3}}, {0xd5, 0x1, {0x2, 0x1}}, {0x5, 0xf301, {0x1, 0x3fc0000}}, {0x9e9, 0x3, {0x0, 0x2}}, {0x0, 0x5d, {0x1, 0x7d}}, {0x7, 0x6, {0x2, 0x1f}}, {0x2, 0xf1c5, {0x3, 0x1}}, {0x0, 0x7835, {0x3, 0x8}}, {0x0, 0x7, {0x2, 0x6}}, {0x4, 0x10, {0x2, 0xc1}}, {0x7, 0x9, {0x3, 0x6}}, {0x6, 0x4, {0x0, 0x9}}, {0x6, 0x4, {0x2, 0x7deae39b}}, {0xfff, 0xbeed, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x7, 0x9, 0x81, 0x9, 0x3, 'syz1\x00', "81f9bdefdb2e2a335518091171b1b25b4bc61278bf5aafbee81a30ddb0048f2a", "3e9cf6d926f83a81b619b5157ab11ce2dd02e35e71f99bc32543ff7af5864dac", [{0x662, 0xb1, {0x1, 0x2}}, {0x7f, 0xff, {0x0, 0x1}}, {0xffff, 0x4, {0x2, 0x2000000}}, {0xff, 0x1, {0x1, 0x80000000}}, {0x9d8, 0x3, {0x0, 0x1}}, {0x26, 0x7ff, {0x3, 0x8}}, {0x6, 0x8001, {0x3, 0xf7}}, {0x800, 0x4, {0x2, 0x1}}, {0x1, 0xfd41, {0x3, 0x9}}, {0x40, 0x4, {0x0, 0x6}}, {0x1, 0x4, {0x2}}, {0xfbff, 0xfff, {0x3, 0x7}}, {0x1, 0xd1, {0x3, 0xe70}}, {0x800, 0xa7, {0x3, 0x4}}, {0x4, 0x8, {0x1, 0x1b60c29d}}, {0xfd, 0x0, {0x3, 0x7}}, {0x5, 0x5, {0x3, 0x4}}, {0x0, 0x8, {0x1, 0xff}}, {0x0, 0x7b46, {0x0, 0x10000}}, {0x1f, 0x811d, {0x1, 0x12}}, {0xfbff, 0x900, {0x1, 0x54}}, {0x8, 0xfffd, {0x3, 0x80000000}}, {0x1, 0x1, {0x3, 0x4b98}}, {0x0, 0xfffe, {0x873b6d69b55a5488, 0x1}}, {0x200, 0x0, {0x1, 0x2}}, {0x2, 0x100, {0x3, 0x800}}, {0x6f1, 0x4, {0x3, 0x1}}, {0x1, 0xf7c, {0x2, 0x8}}, {0x8b6, 0x2, {0x1, 0x200}}, {0x2, 0x2, {0x0, 0x6}}, {0x8, 0x2, {0x0, 0x6}}, {0x5, 0xc2bd, {0x2, 0x10001}}, {0xf85, 0x9, {0x2, 0x6f}}, {0x7, 0xff, {0x3, 0x6}}, {0x0, 0x5b45, {0x2, 0x1}}, {0x1000, 0x7, {0x2, 0x200}}, {0x1000, 0x4e, {0x1, 0x403}}, {0x8, 0xf397, {0x2, 0x8}}, {0x81, 0x2, {0x0, 0xfffffffb}}, {0x5, 0x7, {0x2, 0x40}}]}}}, {{0x254, 0x1, {{0x1}, 0x0, 0xff, 0x3fce, 0x7fff, 0x19, 'syz1\x00', "812dfc9c4e3594d46630716ff2f3e3b50e4379ca2f04931cf5e4855464ed153f", "d2088e190d902f0cf4029e1f07e46c164396bbbf1f8e4bc9d9711be9d289d967", [{0x2, 0xad3a, {0x0, 0x2fb}}, {0x1000, 0x1f, {0x3, 0xfffffffc}}, {0x2, 0xffff, {0x2, 0xfff}}, {0x5, 0x7ff, {0x3}}, {0x97, 0x7fff, {0x3, 0x80}}, {0x0, 0x6, {0x1, 0x80000000}}, {0x1, 0x0, {0x0, 0x200}}, {0x8000, 0x5, {0x2, 0x40}}, {0x2, 0x7ff, {0x0, 0x7fff}}, {0x8, 0xfffc, {0x0, 0x800}}, {0x1000, 0x3ff, {0x0, 0x8}}, {0x1, 0x0, {0x0, 0x791e3478}}, {0x4, 0x4000, {0x0, 0x7e1}}, {0x7, 0x6, {0x2, 0x9}}, {0x8400, 0x7ff, {0x1, 0x7fffffff}}, {0x6, 0x9, {0x3, 0x3f}}, {0xe61, 0x40, {0x2, 0x1}}, {0x3, 0x1000, {0x1, 0x2}}, {0x5, 0x101, {0x3, 0xff}}, {0x8000, 0x8, {0x2, 0xffff0001}}, {0x7444, 0x9, {0x3, 0x6}}, {0xff, 0x6, {0x2, 0x101}}, {0x2, 0xfffe, {0x3, 0x5}}, {0x5, 0x2, {0x3}}, {0xfffe, 0x6f, {0x2, 0x2}}, {0x3, 0xa80e, {0x1, 0x7fff}}, {0x2, 0x20, {0x2, 0x5}}, {0x9, 0x7, {0x0, 0xdf7}}, {0x6, 0x4c4, {0x2, 0xae2}}, {0xefe, 0x4, {0x2, 0x5}}, {0x3, 0x20, {0x3, 0xfffffff8}}, {0x9, 0x9, {0x1, 0xfffffff7}}, {0x9, 0x400, {0x0, 0xfff}}, {0x4, 0x7, {0x3, 0x9}}, {0x400, 0xc1, {0x1, 0xffffff7f}}, {0x80, 0x40, {0x0, 0x5}}, {0x7, 0x8000, {0x2, 0x1f}}, {0x1000, 0x6, {0x2, 0x4}}, {0x7ff, 0x672, {0x1, 0x25ef}}, {0x6, 0x2, {0x2, 0xffff}}]}}}]}, 0x1508}}, 0x20000060) r3 = syz_mount_image$ext4(&(0x7f0000001700)='ext3\x00', &(0x7f0000001740)='./file0\x00', 0x5, 0x2, &(0x7f0000001800)=[{&(0x7f0000001780)="fbf89fc601bbe01ec7cd0a4c5018282e0798", 0x12, 0xe4}, {&(0x7f00000017c0)="6ee4dabaf3", 0x5, 0x8}], 0x101002, &(0x7f0000001840)=ANY=[@ANYBLOB="6d61785f626174d6e853c7a423278e63685f740400000030783030303030303030303030306e6f6c617a"]) readlinkat(r3, &(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)=""/6, 0x6) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00@\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf250600000005002d00010000000a0009000180c20000010000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x20, 0x0) 04:32:05 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) sendmsg$FOU_CMD_DEL(r0, 0x0, 0x20048850) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) 04:32:05 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1, 0x6, @link_local}, 0x14) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00@\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf250600000005002d00010000000a0009000180c20000010000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x20, 0x0) 04:32:05 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010100}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x60}}, 0x40004) 04:32:05 executing program 4: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x47, @private1={0xfc, 0x1, '\x00', 0x1}, 0xf7}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20008010}, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:05 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1, 0x6, @link_local}, 0x14) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=@expire={0x19c, 0x18, 0x4, 0x70bd2c, 0x25dfdbfb, {{{@in=@multicast1, @in=@loopback, 0x4e24, 0x6f, 0x4e23, 0x0, 0xa, 0xa0, 0x20, 0x8, 0x0, 0xffffffffffffffff}, {@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d6, 0x6c}, @in=@remote, {0x6, 0x81, 0x1, 0x400, 0x4, 0x5181, 0xffffffffffffff01, 0x100000001}, {0xf8, 0x4, 0xffffffffffffffc1, 0x1000}, {0x7fffffff, 0x3, 0x100}, 0x70bd26, 0x3507, 0xa, 0x7, 0x1, 0x74}, 0x5}, [@address_filter={0x28, 0x1a, {@in6=@empty, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x2, 0x7, 0xff}}, @algo_crypt={0x70, 0x2, {{'ecb(des3_ede)\x00'}, 0x140, "0c6b97694f6738af50262f2fb0347210d97fcdf0b76ddbeb39b2230782cf9c35b292c9a4dd141fda"}}, @offload={0xc, 0x1c, {0x0, 0x3}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x80015}, 0x80) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000e7", @ANYRES16=0x0, @ANYBLOB="040025bd7000fddbdf2502000000060001004e23000008000800ac1414bb060001004e230000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000805}, 0x48000) r2 = fsmount(r0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040000080039001200000008000000ff00000008003a000800"/38], 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x80) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:05 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x9c, 0x3, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_NAT_SRC={0x70, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @private2}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @empty}]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x4}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) getpeername$packet(r0, 0x0, 0x0) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00@\x00', @ANYRES16=0x0, @ANYBLOB="080027bd7000ffdbdf250600000005002d00010000000a0009000180c20000010000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1, 0x6, @link_local}, 0x14) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0x70) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), r0) socketpair(0x15, 0x3, 0x7, &(0x7f0000000240)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r2) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000008c598935532761ffe91fe34b7edfbc4ecc12fa21b0a049dc1f44d36adaf6eec079f99eef388d24392eac1f4460c4bbcc2180536762655a7b18ed8c446ed4d92972594de532f6c2e540b2bee084277d340434183b21db16e6d1e774df4a470907841250a873c1c110e9c5174c7a301eb45488262a651a4a", @ANYRES16=r1, @ANYBLOB="00012dbd7000fbdbdf250a000000100002800800010001000080040004001400028008000100001000000800010002000000"], 0x38}, 0x1, 0x0, 0x0, 0x4000010}, 0x40040) r3 = fsopen(&(0x7f0000000000)='autofs\x00', 0x0) fsmount(r3, 0x0, 0x9) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) connect$packet(r1, &(0x7f0000000000)={0x11, 0x19, 0x0, 0x1, 0x9, 0x6, @random="124a51845377"}, 0x14) 04:32:05 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 0: rt_sigqueueinfo(0x0, 0x15, &(0x7f0000000000)={0x12, 0x3, 0x9}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000080)=""/66) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000240)={0xffffffff, 0x8000, 0xff, 0x7, 0x3f, 0x373}) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000000000300000208000740000020000900a60073797a3200000000"], 0x28}, 0x1, 0x0, 0x0, 0x24040004}, 0x20000810) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x1, 0x4) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x10, 0x10, 0x41, 0x1f, {{0xb, 0x4, 0x2, 0x1, 0x2c, 0x64, 0x0, 0x81, 0x0, 0x0, @multicast2, @loopback, {[@ssrr={0x89, 0x13, 0x8, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback]}, @ssrr={0x89, 0x3, 0x96}]}}}}}) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x5, r0, 0x1, 0x1, 0x6, @remote}, 0x14) 04:32:05 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) pipe2(&(0x7f0000000000), 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)="f40128f32577a6ba9709b52c64e2238c28bed3c9e725a065607179aa2c5efa15bfef2836d9930ae2cffff809a85579bc5912370748daa10e52513d0e9ae92e515e1cb19104a181cae98c3278d542e9d9d013d7f635138498", 0x58, r2}, 0x68) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 3: faccessat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) 04:32:05 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x10140, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) io_uring_setup(0x6986, &(0x7f0000000040)={0x0, 0x5234, 0x8, 0x2, 0x15}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) 04:32:05 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="3f35dd53eba94df98bfedee3905253430c836feb89826bf895fa492d911786f70862a7b70033ac29ae8cf9657f23cfb521d347fa31028d99bb438644f7a06770eb9a9e39d72ce46f33827625c541e25109887aa1d4b72b272590efc2a2c097298fe4913c8ed06446b3b7e5ed85b394acc4a6f17aea29c8deeaf9b9664f7e37cb91b47447f88b89f389efca70de3adc877d247c1b49d0511437da64745e5b1226863748d142fffd5bce7c6f758c41f22863341b88c5c014c6c184e6c20634d1e3ae74e5c387ad3d15289b8a5acec1e26e9ee1f78d44708f6b4825aa6ba6b94f", 0xdf, 0x4}, {&(0x7f0000000180)="ef2dda11c73f3563fcb00eb319ac47c7d4fc3c2ba702bf1ddce9c512b8a2815df4278e6b0a3ba7b93b04e7288293fc859c091c08cc3ef474e9a3fffadb692798a869aa68411e7e886756b5c4364d5232554f1ec34296f34ac9a381e9e2beac5704c43f1d64252bf6c1d4803338f76ea888dbb52fd8df038071504defa418321259aabc9f4394af6c0bb120b09af461a210b3c0f4b5f8eb3e6cb90eb473315f251188e26bf0076ec492c5dbffcda9c95670587bbc223d882abb3114d7adb16e713211fd57bdb0f3e21760f298326982e248d97b1350da50832fb3a25dd30bc053e44ef46da4", 0xe5, 0x9}], 0x200000, &(0x7f00000002c0)={[{@init_itable_val={'init_itable', 0x3d, 0x7f}}, {@data_err_abort}], [{@seclabel}, {@fowner_eq}, {@fsname}]}) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:05 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'syztnl2\x00', &(0x7f00000001c0)={'gre0\x00', 0x0, 0x8, 0x8000, 0x8, 0xe0d, {{0x23, 0x4, 0x1, 0x1, 0x8c, 0x65, 0x0, 0x9b, 0x2f, 0x0, @empty, @multicast1, {[@noop, @cipso={0x86, 0xc, 0x3, [{0x5, 0x6, "98660b5f"}]}, @ssrr={0x89, 0x13, 0x71, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_addr={0x44, 0x2c, 0x43, 0x1, 0x8, [{@loopback, 0x2}, {@loopback, 0x40}, {@empty, 0x7}, {@multicast1}, {@local}]}, @ssrr={0x89, 0x1f, 0x53, [@multicast1, @private=0xa010101, @remote, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @private=0xa010100]}, @rr={0x7, 0xb, 0x6b, [@rand_addr=0x64010100, @multicast2]}]}}}}}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfffffffe}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4014000}, 0x4) r2 = getgid() setresgid(0xee00, r2, 0x0) 04:32:05 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xc}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x61}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000080)=""/192, 0xc0) r4 = fsmount(r3, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffffffff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x80000001}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000001}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4810) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x100) 04:32:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r3 = getpid() getpgid(r3) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) r4 = accept4$packet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x14, 0x1800) getsockname$packet(r4, &(0x7f0000000140), &(0x7f0000000180)=0x14) [ 148.645906][T29999] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:32:05 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x100) 04:32:05 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:05 executing program 5: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:05 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="84020000c8fdc5051e4e8eb03fd2b2e4bb194415b02120aa0aa57e3542a552c43a9e07d9bc27cef91ed84f88d741f8ee5b25d0cf4d026df3f761ef9088c049b9f0ba997c5653ac4013e418fe3e15db87a8e24dbc430861227b4a3b70e14e966ec90bc5", @ANYRES16=0x0, @ANYBLOB="000329bd7000fbdbdf25090000001800028008000100010001000800020002000000040004005c00048024000780080002000500000008000200e7fd000008000200070000000800020008000000140007800800040008000000080001000700000014000780080001001500000008000300010000000900010073797a31000000004c0005801c0002800800040001000000080002002000000008000300a39f00002c000280080001000700000008000300228100000800040008000000080001001000000008000100130000007c010680da000300a657e1be1fb22e4ea0141b13b12eec72fd754332becea956fe74951e13eabbfecd2f5520b11faf3e36b250480a9556ed8ac24b32266b8dc77a6b71812aba7db8f31790638b4f05b6af8fe35837041b35d70222c6fa7700b2ee96caf779355d14e9076476763f29066725deb83cc7c16e53db7073aad65d5b660d9b8b7882779fff92068ec80e2436910c0091796f25a033d28d08730690b03620e786d72544f5ebd34a7ca354aaa3078a1df7c10fdb29fe1170f2594fe2eeb6de5417b32407275ab3c17a2f93ac964122ece74e994f88cecf4fd4183200008a000300691d683d67613e3df781fbbf896176a197613b88e2d1364ba9d56a528f91d9b2d840b837ca27303b80ab771bae7667e5e1b75fd49b9cd894db02bdbbde9ecc00e82e5a8b2c3cb650520d251b4df6effc3e9fc89fe868ca2c1a8566ae40ff8a057b7360b4d4fa4e269273014da3bec7ffdc42bda8b04d2dc1b0c7fb9ce2ab12e438661d0b1e100000080001007f02000004000300040002003400038008000100fcffffff08000300050000000800030006000000080003000200000008000300060000000800020000000000"], 0x284}, 0x1, 0x0, 0x0, 0x24000051}, 0x10004010) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x38, r0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x22004089) 04:32:05 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0xf, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14004084}, 0x4080000) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20a000, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c000000000b010200000000000000000500000908000340000000000f0005000000000000007672616d0000"], 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x4001) accept4$packet(r1, 0x0, &(0x7f0000000140), 0x80000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) getpeername$packet(r3, 0x0, 0x0) [ 148.686083][T29999] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 148.749335][ T1038] ================================================================== [ 148.757482][ T1038] BUG: KCSAN: data-race in __blkdev_put / __blkdev_put [ 148.764335][ T1038] [ 148.766651][ T1038] write to 0xffff8881013646e0 of 4 bytes by task 1761 on cpu 0: [ 148.774272][ T1038] __blkdev_put+0x122/0x460 [ 148.778772][ T1038] blkdev_put+0x23e/0x2c0 [ 148.783101][ T1038] blkdev_close+0x47/0x50 [ 148.787434][ T1038] __fput+0x25b/0x4e0 [ 148.791414][ T1038] ____fput+0x11/0x20 04:32:06 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6841a8eed4954809}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xff}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x41}, 0x80) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0xc02, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x22000800) [ 148.795432][ T1038] task_work_run+0xae/0x130 [ 148.799936][ T1038] exit_to_user_mode_prepare+0x156/0x190 [ 148.805590][ T1038] syscall_exit_to_user_mode+0x20/0x40 [ 148.811058][ T1038] do_syscall_64+0x56/0x90 [ 148.815493][ T1038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.821391][ T1038] [ 148.823743][ T1038] read to 0xffff8881013646e0 of 4 bytes by task 1038 on cpu 1: [ 148.831284][ T1038] __blkdev_put+0x5a/0x460 [ 148.835706][ T1038] blkdev_put+0x23e/0x2c0 [ 148.840069][ T1038] blkdev_close+0x47/0x50 [ 148.844483][ T1038] __fput+0x25b/0x4e0 [ 148.848479][ T1038] ____fput+0x11/0x20 [ 148.852459][ T1038] task_work_run+0xae/0x130 [ 148.856967][ T1038] exit_to_user_mode_prepare+0x156/0x190 [ 148.862606][ T1038] syscall_exit_to_user_mode+0x20/0x40 [ 148.868074][ T1038] do_syscall_64+0x56/0x90 [ 148.872499][ T1038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.878408][ T1038] [ 148.878412][ T1038] value changed: 0x00000002 -> 0x00000001 [ 148.886453][ T1038] [ 148.888772][ T1038] Reported by Kernel Concurrency Sanitizer on: 04:32:06 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3d1f718048075c4eca350e31c4d73ff0dc0e83e8df234dc20dc06224fd62e6e2c2239f03778f80275b81f32c89bea586eb3ed500c2441a321eea38e39c5a1cdb6263b78ff3aa15442c4173ee4fee0d9dc608545d7821", @ANYRES16=r0, @ANYBLOB="000128bd7000fbdbdf2505000000080039003f00000008003c0000800000"], 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x1) 04:32:06 executing program 3: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x100) 04:32:06 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) recvfrom$packet(r0, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) r1 = fsmount(r0, 0x0, 0xc4) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x71867208}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008014}, 0x40081) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000140)={0x8, 0x8, 0x6, 0x4, 0x1, 0x2}) 04:32:06 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f00000002c0)={'erspan0\x00', 0x0, 0x7800, 0x1, 0x1, 0xfffffff9, {{0x2a, 0x4, 0x3, 0x9, 0xa8, 0x67, 0x0, 0xfd, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@generic={0x58, 0x8, "7ff872c5ab3f"}, @timestamp={0x44, 0xc, 0x82, 0x0, 0x2, [0x40, 0x1ff]}, @ssrr={0x89, 0x7, 0xf1, [@multicast1]}, @generic={0xb, 0xe, "2ee673f280434c73cea0165f"}, @rr={0x7, 0xf, 0x57, [@loopback, @loopback, @rand_addr=0x64010100]}, @cipso={0x86, 0x5a, 0xffffffffffffffff, [{0x6, 0x6, "481a6bcc"}, {0x1, 0xd, "780be8c5549417a7526b59"}, {0x7, 0x6, "a33c730c"}, {0x1, 0x3, "c7"}, {0x2, 0xf, "b4129f000099ce88bdf84a761f"}, {0x7, 0xb, "a29bcd60010c850f79"}, {0x6, 0x3, "cc"}, {0x7, 0x3, "f7"}, {0x5, 0x11, "56377126027b3c4f3862eafbc761d9"}, {0x5, 0x7, "cfd0aaede2"}]}]}}}}}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000228bd7000fedbdf25020000000500030000000000050003006200000008000600ffffffff050003005e0000000500040002000000050003002f00000004000500050003003b00000008000b00", @ANYRES32=0x0, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r1, @ANYBLOB="060001004e210000"], 0x68}, 0x1, 0x0, 0x0, 0x2c004091}, 0x24008480) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 04:32:06 executing program 2: r0 = getpgrp(0x0) getpgrp(r0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) [ 148.894914][ T1038] CPU: 1 PID: 1038 Comm: systemd-udevd Not tainted 5.13.0-rc5-syzkaller #0 [ 148.903538][ T1038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.913578][ T1038] ================================================================== 04:32:06 executing program 5: pipe2(0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) sendto$packet(r0, &(0x7f0000000080)="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", 0x1000, 0x8000, &(0x7f0000001080)={0x11, 0x4, 0x0, 0x1, 0x2, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}}, 0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x6) 04:32:06 executing program 3: faccessat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:32:06 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:06 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) socketpair(0xb, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=ANY=[@ANYBLOB="17dd00b2", @ANYRES16=r1, @ANYBLOB="000826bd7000fedbdf251200000008002c000000010008000b00c902000008003c000400000008003200040000000a000900bfa1be99b6bd0000"], 0x40}, 0x1, 0x0, 0x0, 0x1041}, 0x8) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000080)={0x39c, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x140, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xa1, 0x3, "403b644257aa02f71f9f72246b6cdd4dd74720bdb85a18070226d9dbca24da806bf245046bf13d49393830130d3249a65ec4b7aea8a060bfb5ad9892d0efc5a0d00456adcd2453aa455c7348f90cca34e3498f7f87b91d3fa487ffbbe0aa385dd79bcc6fac07ca563f37d6c533a6d78d6104cea9ccfa95522b129c961da49bd348b4b9ff78f8de492f698188d908e40abe5418e2c377ebfd9df5bebf37"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "5a2b6b913a7bbd3da6d5e6408f016b6095942945"}}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "c7327916f5e7fccf893ed6bb3270c285b61dad7c6ad17c5fbc01875349ac7e37ab6452"}}]}, @TIPC_NLA_MEDIA={0x124, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x22}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3bc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaef}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xb4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10265d41}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffe4d8}]}, @TIPC_NLA_MEDIA={0x84, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a80), 0x200200, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000ac0)=[@window={0x3, 0x6, 0x81}, @window={0x3, 0xb59, 0x93a2}, @window={0x3, 0x1, 0xffff}, @window={0x3, 0x7ff, 0x3}, @timestamp, @window={0x3, 0x9, 0x2}, @sack_perm, @mss={0x2, 0x5}, @sack_perm, @mss={0x2, 0x7f}], 0xa) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) recvfrom$packet(r2, &(0x7f00000008c0)=""/116, 0x74, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40), r3) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000880)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000840)={&(0x7f0000000500)={0x310, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x11c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x93, 0x3, "b1dceed85bec8860913a6dbf3e9b12ae3f0f10ada9d1cc53551b2cc26e22e72c340352522df2ca05d21ba03cc39bc3902d2c9a89e677d8f4003bdbf94e878d73f95f8532da33f5a83bd15c66cf7082fae24085f678d961c352e244547de5414be3899842510dd0e58d52703349bbee757ab56be0ca10ebf117fef389ff0e04dab49c5844f3b912ba07eed3f17a50eb"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ID={0x7c, 0x3, "77f65c7ff7d52d6bcefa278960d267a64e447942fa50679a5b2132a1a9c92343dae562b855086cf7220754b9d8b29866d68cf64529ba07130ceb7a1314a9a487eee1c3c9e433a864d07ef105b5ca86c285f7408b87859cffcf20205ad9592c4fed9a7bb11e967b10f8ee8bde46e9228e1c4e1a6bead6100c"}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x276}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_LINK={0x74, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x657}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x100, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8f1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x64010102}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @loopback, 0x7}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x43e8, @rand_addr=' \x01\x00', 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}]}, 0x310}, 0x1, 0x0, 0x0, 0x20044044}, 0x8010) getsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, 0x0, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000001d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001d00)={&(0x7f0000000c40)={0x10bc, 0x4, 0x1, 0x201, 0x70bd25, 0x25dfdbfd, {0x5, 0x0, 0x2}, [@generic="a3486dcecdf7e7abcaa2", @nested={0x103c, 0x2e, 0x0, 0x1, [@generic="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", @generic="a5108a1d822ec47234bf5d31b1dadc8aae4e9cbe3e6e611a877098942ea22273539a3869", @typed={0x8, 0x16, 0x0, 0x0, @u32=0x3}, @typed={0xc, 0x1, 0x0, 0x0, @u64=0xff}]}, @generic="6e743f101214d5d15b3826ba067c367abd0b55284b7fc5f047a07c5b2d6555f6d316b8c62cbe47ae1962b54887ecbfdf8707498198d78255019a5af8de9f093bb5dbc476a9502a6f204fb067c5c44a5afefc8e0e", @nested={0xc, 0x77, 0x0, 0x1, [@generic="e875afab0a275c36"]}]}, 0x10bc}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 04:32:06 executing program 5: pipe2(0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000004c0), 0x8200, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000500)={0x7d, 0xef, 0x2, 0x64, 0x6, 0x9d}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x4, &(0x7f0000000240)=[{&(0x7f0000000080)="603da240ca3330f3b0b09fdc16a7b2fbaa0601f319850bb805c205610ca75a3fe9256393ca871761ce0c5ca6bb9b862ceede921c92114b8f741c9b83b8457be27cc9c19740e49c564534cabfb3f52451a7db097c54a7b369b41239bc1364ee736310e71d043d2d6f8f86908d4348", 0x6e, 0x5}, {&(0x7f0000000100)="ff308f50f4bf7aa0432f09daa24a7b74a707872a945772f824a112de7eea205d19edbb7feab9c5f8efdcece3", 0x2c, 0x1}, {&(0x7f0000000140)="92ce695e771d8137c53adc6d31ed30a5a76bb7825d862d7321e127300fd75c7d17395da9735e32928cc906129492791eac9552223b667086510dca334a1819691d6ab23eb567ace3714c634d3fc4adb42fa6d64ce27634361da369bf228b4e8767c29dc5fc8793c7e91f52bbed864bdc8ec64241c7088fe0fe1db04ca7fdb1b14f315627a8b8365366", 0x89, 0xbfffffffffffffc1}, {&(0x7f0000000200)="e2833e6120269d4702b4fd8947bf75cca88330", 0x13, 0x1}], 0x4000040, &(0x7f0000000540)=ANY=[@ANYBLOB="6e6f75696433322c6e6f6d626c6b5f696f5f7375626d69742c7573726a71756f74a9d46fc502cadd68a7613d2e2f66696c65302c646973636175642c696e6f64655f7265616400000000000000006b733d30303030303030322c646174615f6572723d69676e6f72652c6e6f67727069642c646174615f6572723d69676e6f72652c6e6f757365725f78617474722c6c617a7974696d652c7063723d3030303030303030303030303030304d30", @ANYRESDEC=0xee00, @ANYBLOB="2b28fa1e08000000000000015f747970653d5c4e2c666f776e65723e000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',fowner<', @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,fsname=,pcr=00000000000000000004,\x00']) linkat(r1, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0) 04:32:06 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0xf8a93cfece32da8f) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x81000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x1010, r0, 0x8000000) 04:32:06 executing program 2: r0 = socket$packet(0x11, 0x1, 0x300) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x400) getpeername$packet(r0, 0x0, 0x0) 04:32:06 executing program 3: fsmount(0xffffffffffffffff, 0x0, 0xfc) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="3f35dd53eba94df98bfedee3905253430c836feb89826bf895fa492d911786f70862a7b70033ac29ae8cf9657f23cfb521d347fa31028d99bb438644f7a06770eb9a9e39d72ce46f33827625c541e25109887aa1d4b72b272590efc2a2c097298fe4913c8ed06446b3b7e5ed85b394acc4a6f17aea29c8deeaf9b9664f7e37cb91b47447f88b89f389efca70de3adc877d247c1b49d0511437da64745e5b1226863748d142fffd5bce7c6f758c41f22863341b88c5c014c6c184e6c20634d1e3ae74e5c387ad3d15289b8a5acec1e26e9ee1f78d44708f6b4825aa6ba6b94f", 0xdf, 0x4}, {&(0x7f0000000180)="ef2dda11c73f3563fcb00eb319ac47c7d4fc3c2ba702bf1ddce9c512b8a2815df4278e6b0a3ba7b93b04e7288293fc859c091c08cc3ef474e9a3fffadb692798a869aa68411e7e886756b5c4364d5232554f1ec34296f34ac9a381e9e2beac5704c43f1d64252bf6c1d4803338f76ea888dbb52fd8df038071504defa418321259aabc9f4394af6c0bb120b09af461a210b3c0f4b5f8eb3e6cb90eb473315f251188e26bf0076ec492c5dbffcda9c95670587bbc223d882abb3114d7adb16e713211fd57bdb0f3e21760f298326982e248d97b1350da50832fb3a25dd30bc053e44ef46da4", 0xe5, 0x9}], 0x200000, &(0x7f00000002c0)={[{@init_itable_val={'init_itable', 0x3d, 0x7f}}, {@data_err_abort}], [{@seclabel}, {@fowner_eq}, {@fsname}]}) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:06 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x168, 0xa, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_SET_EXPR={0x14c, 0x11, 0x0, 0x1, @cmp={{0x8}, @val={0x140, 0x2, 0x0, 0x1, [@NFTA_CMP_OP={0x8}, @NFTA_CMP_DATA={0x11c, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe6, 0x1, "8a1c9d8f37888871ca2dfdfedb3831d24bcf693c672d3cadf223d37e2f04143b3cfa10463726186734a7199fca04c71788a07e801b9b1b88660f01d831406a605c4926de8d011166d1497181d785b18479ba4701c00128c1512c43830147afdcb986805f813f04a6174bca9a32883cfe1a7ac05dedd05afffb4d865d10da5a0f209958dc20bf1f518e37f2edd0f8193f04df340f60ba080ec65ba690e5baac5cb828bf29430421f60750f994e3145377f74d3f7d4c358145d30ae65a86b7e578a1f93425fe1fae8970e5a090b60388838e2410ebff4763d85fe36c0de5d1e5152f3f"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x3}]}}}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x21}]}, 0x168}, 0x1, 0x0, 0x0, 0x4080890}, 0x20040000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x2, 0x9, 0x18, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x7, 0x800, 0x4d21}}) 04:32:06 executing program 5: pipe2(0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x8, 0x7800, 0x9, 0x6, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x68, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@noop, @generic={0x88, 0x5, "d7dfc7"}, @end, @cipso={0x86, 0x51, 0x1, [{0x5, 0x12, "65c3c027dc22bdd875b1d49e92f2ae3c"}, {0x7, 0xf, "6caa9eecdf0b8a7b652aede11f"}, {0x1, 0x8, "2191b9649779"}, {0x1, 0xc, "8ddd8cf9da74c65ffe3e"}, {0x6, 0x2}, {0x2, 0xc, "bc76e0f851f27034bc0e"}, {0x7, 0x8, "a93dd54b2d09"}]}, @noop]}}}}}) 04:32:06 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_io_uring_setup(0x63ed, &(0x7f0000000040)={0x0, 0xb88f, 0x1, 0x0, 0x2fc}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='&\x00', 0x0, r0) [ 149.144574][T30094] loop1: detected capacity change from 0 to 12287 [ 149.156156][T30094] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 149.176736][T30101] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:06 executing program 5: pipe2(&(0x7f0000000100), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x184000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x20044804) 04:32:06 executing program 3: fsmount(0xffffffffffffffff, 0x0, 0xfc) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="3f35dd53eba94df98bfedee3905253430c836feb89826bf895fa492d911786f70862a7b70033ac29ae8cf9657f23cfb521d347fa31028d99bb438644f7a06770eb9a9e39d72ce46f33827625c541e25109887aa1d4b72b272590efc2a2c097298fe4913c8ed06446b3b7e5ed85b394acc4a6f17aea29c8deeaf9b9664f7e37cb91b47447f88b89f389efca70de3adc877d247c1b49d0511437da64745e5b1226863748d142fffd5bce7c6f758c41f22863341b88c5c014c6c184e6c20634d1e3ae74e5c387ad3d15289b8a5acec1e26e9ee1f78d44708f6b4825aa6ba6b94f", 0xdf, 0x4}, {&(0x7f0000000180)="ef2dda11c73f3563fcb00eb319ac47c7d4fc3c2ba702bf1ddce9c512b8a2815df4278e6b0a3ba7b93b04e7288293fc859c091c08cc3ef474e9a3fffadb692798a869aa68411e7e886756b5c4364d5232554f1ec34296f34ac9a381e9e2beac5704c43f1d64252bf6c1d4803338f76ea888dbb52fd8df038071504defa418321259aabc9f4394af6c0bb120b09af461a210b3c0f4b5f8eb3e6cb90eb473315f251188e26bf0076ec492c5dbffcda9c95670587bbc223d882abb3114d7adb16e713211fd57bdb0f3e21760f298326982e248d97b1350da50832fb3a25dd30bc053e44ef46da4", 0xe5, 0x9}], 0x200000, &(0x7f00000002c0)={[{@init_itable_val={'init_itable', 0x3d, 0x7f}}, {@data_err_abort}], [{@seclabel}, {@fowner_eq}, {@fsname}]}) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:06 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="1231044bbeaabf517eb758e1971426e94947dc6f0150fc87549b9ab4da6e9c90e5a84e884ff4d071fb40d690db72bb88b4d6ff417e9225420b063e5faf8abf49c89b14f6cbca43d7bf7a97305a11276aa68ffadadc7a9da30ea9ab8f7432aba3f38e2773608d0fbd41e0178b304667c5a45f6e58246fd60eb8e623c1b8b8643bc0efaf5ae74b96ae438c3afc03a961d140ade6f521ac007e2831b4a3145b3649a2d3303c56ab44df07c1c78f39d730c5278fcec95fd27ee4a2275bfb4931b9a606fc6f30e83a1be99e8687d6739ed64a2cb67dfafbf02825ecdcfedf56e43c5bce1d93308fd09aed3ea9e24f452b", 0xee, r0}, 0x68) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xfc, r1, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x14000}]}, @TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb3e8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xad7}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:32:06 executing program 5: pipe2(&(0x7f0000000100), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8001, 0x5, &(0x7f0000000440)=[{&(0x7f00000000c0)="bd7e044dbaa06982e930584f31a9cad25fc2d4594b7b281aa6fb43138fba0271fa9ac7f91a822c79560117069acdf89511be67104f04fecf68c42d30809f574d9a412951fc0e8f8615a83f53264b964b743bbd46c8df09cfbcf032821112361701c4d6fa20885acbe084bd3a243da8b65bc1a445fb7cb6a8c0972dc5ef418627bb8bf08dcbb49b43410bc3240c", 0x8d, 0x800}, {&(0x7f0000000180)="d6ab5fa3082ee5a40ce24483cfa6faf11475b59c256e7134b9ccddcce38445b6bce7d4aa7a4c807e954d0fdf872f38bcd983a24f7e260806a447fa5eff353a139af47ca42cce3bb6c7b266f82a35269a7acc2bd39788c62cb5d6073ded4c3e62338df4beab93886c8ed37a951e2f51d31b5a8b549b6f81f7f196d75557cefe01d7d63b8fd1907f3fb7e94c435c89933bd3a5ad189f4bb7c76e8baf15ba2fdea3c598086b9724a99c86889f9bada9fb8cb300f4527c2fbebf635f54449235f41cc09dd428086b1e", 0xc7, 0x2}, {&(0x7f0000000280), 0x0, 0xfffffffffffff801}, {&(0x7f00000002c0)="5b8caa4f926267761a06e0ddb0ecb5a0cd07307bb12d4a80485f7fd11cabcac49823b275f3d91dc450560515c9f66135ae3f9fc4941c2e8156369015996d1b6dc55ff0c4d004a06f414f5dfc75e4a49ee990d073663ecb423714eb258303a9ad5a456df6fb8253d2e99c6a2874c3d93383b25af6524f7dbf4e7579a9c2fd5575ea80bd11a06af0603385d569e65a738c7ba97bad0fc7390171ea13b9c835649540d189cd90ccf20f4c8071a655acec4120065de07f4be77d07d4cbbf6b4bff903fae483eb23e88ad23264fd43646864492b56aa7cd39e66af2b9d776c6e667637ce642ec105e67e29cc6ca5f9be0313b4d21de59914dd55d", 0xf8, 0x800}, {&(0x7f00000003c0)="8cd17cde7135dc5892737400a578ef6955277149ade593f07008f8e44bb9ad36dfc6988c0132484fb023ac019d4b22123365dcc6f0e7ac4b66ff4568ef42f780237a5c0b5cfc38501327c298ab805285c724c7bff18dfa3b21d41b369a224c55455175b961ba81ebf8ab18", 0x6b}], 0x0, &(0x7f00000004c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x32, 0x4b, 0x41]}}], [{@euid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, '@)$#'}}, {@uid_gt}, {@permit_directio}]}) mkdirat(r0, &(0x7f0000000540)='./file0\x00', 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) execveat(r1, &(0x7f0000000580)='./file0\x00', &(0x7f0000000600)=[&(0x7f00000005c0)='\x00'], &(0x7f00000007c0)=[&(0x7f0000000640)='\x00', &(0x7f0000000680)='uid>', &(0x7f00000006c0)='uid>', &(0x7f0000000700)='@)$#', &(0x7f0000000740)='&]\x00', &(0x7f0000000780)='^#)\x00'], 0x1000) socket$packet(0x11, 0x3, 0x300) r2 = syz_mount_image$nfs4(&(0x7f0000000840), &(0x7f0000000880)='./file0\x00', 0x6, 0x2, &(0x7f0000000a40)=[{&(0x7f00000008c0)="1d8de74035d57a7441878de54944029fdcc05daf826777f811ba0ca74a1f8e07b187886f0628a8a016bf99e8b081003d8184a3dbdf2f17b7292668a7011bfe8507eb3af05386c103a203e203e06acac8c4b637dd54888bc537a18c87441b407124aeb7ba84fb0306fb628b6d8afbc3b2eff31667c248f4d491580a9d5433e596df7cf678bd28ccdc9dfd97b509d56a1890b0f70e3f5046ac924f9b7268fd1644", 0xa0, 0xfffffffffffffffb}, {&(0x7f0000000980)="ac937aacf7eb2d3bf5e31ced47ffb747dc643a0b884fb7e041d189eee59646021e2d0c0c040ba040b96ee493c7c0c30c2c0e717d03aecf7012bb5df8293004f6810f0e5682ff9aa5eabd88b97b1af6826b8e1fd02fd1dae15846fcff9ce4c0381b87914364036fa28684f1632677c28bd2a86a2aab14a39d800dfbaad060c00945e718ac52174c0642c76ff4fbd8a587124b9bf17b23f500e3fa740d3106a161640fb958180913e3d0c19971d01a1e4d04d44c32b30416", 0xb7, 0xedee}], 0x1000000, &(0x7f0000000a80)={[{'uid>'}, {'+'}], [{@obj_user={'obj_user', 0x3d, '@)$#'}}, {@context={'context', 0x3d, 'system_u'}}, {@uid_lt={'uid<', 0xee00}}, {@audit}, {@dont_measure}]}) linkat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', r2, &(0x7f0000000b00)='./file0\x00', 0x1400) getitimer(0x1, &(0x7f0000000000)) 04:32:06 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) r1 = syz_io_uring_setup(0x4a54, &(0x7f0000000000)={0x0, 0x5761, 0x2, 0x3, 0x206, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x8, 0x1000) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/115) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000c, 0x40010, r1, 0x10000000) 04:32:06 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0xa, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x35}, @NFTA_SET_EXPR={0x1c, 0x11, 0x0, 0x1, @lookup={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x9}]}}}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x14}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x9be229e9eb55e377}, 0x4040001) 04:32:06 executing program 4: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000001080)) pipe2(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x40000) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)='.}\x00', 0x0, r0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r4, 0x89f5, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x20, 0x7ff, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x10, 0x80, 0x7, 0x5}}) [ 149.321287][T30137] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:32:06 executing program 3: fsmount(0xffffffffffffffff, 0x0, 0xfc) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000280)=[{&(0x7f0000000080)="3f35dd53eba94df98bfedee3905253430c836feb89826bf895fa492d911786f70862a7b70033ac29ae8cf9657f23cfb521d347fa31028d99bb438644f7a06770eb9a9e39d72ce46f33827625c541e25109887aa1d4b72b272590efc2a2c097298fe4913c8ed06446b3b7e5ed85b394acc4a6f17aea29c8deeaf9b9664f7e37cb91b47447f88b89f389efca70de3adc877d247c1b49d0511437da64745e5b1226863748d142fffd5bce7c6f758c41f22863341b88c5c014c6c184e6c20634d1e3ae74e5c387ad3d15289b8a5acec1e26e9ee1f78d44708f6b4825aa6ba6b94f", 0xdf, 0x4}, {&(0x7f0000000180)="ef2dda11c73f3563fcb00eb319ac47c7d4fc3c2ba702bf1ddce9c512b8a2815df4278e6b0a3ba7b93b04e7288293fc859c091c08cc3ef474e9a3fffadb692798a869aa68411e7e886756b5c4364d5232554f1ec34296f34ac9a381e9e2beac5704c43f1d64252bf6c1d4803338f76ea888dbb52fd8df038071504defa418321259aabc9f4394af6c0bb120b09af461a210b3c0f4b5f8eb3e6cb90eb473315f251188e26bf0076ec492c5dbffcda9c95670587bbc223d882abb3114d7adb16e713211fd57bdb0f3e21760f298326982e248d97b1350da50832fb3a25dd30bc053e44ef46da4", 0xe5, 0x9}], 0x200000, &(0x7f00000002c0)={[{@init_itable_val={'init_itable', 0x3d, 0x7f}}, {@data_err_abort}], [{@seclabel}, {@fowner_eq}, {@fsname}]}) execveat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:06 executing program 5: pipe2(&(0x7f0000000100), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84800) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x1bbd57da, 0x800, 0x2, 0x6dbd, 0x4}, 0x14) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x8c800) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:06 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x11, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:06 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) [ 149.383327][T30151] loop2: detected capacity change from 0 to 16376 [ 149.398576][T30151] tmpfs: Bad value for 'nr_inodes' 04:32:06 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7f, 0x6, &(0x7f0000001400)=[{&(0x7f00000000c0), 0x0, 0x71}, {&(0x7f0000000100)="a6d7e52c63d08b5c45a2245377a6ce09078a0237c149ed4114f1626cf8489b54b00b4eb52c259ae42b6070be48df065e83dd2480137a06e5af2801b6edbf6fdf194da20eafcc0c3543268839f1a2d21130b95d0e20a4fa85f17b357fe12c1cb69e2e5e9bc4c87cbd6c89ae7465a16846d252485f368b23c7b9c6d36156ecedcd9b02a91a5cc023df475dc4a2d69664ebabe46f81f03344", 0x97, 0x1}, {&(0x7f00000001c0)="c1fd9f2234440b46ba31eb58951bf59e8045298f5479df33d36934b761cce79106886dfb4a4d7ffdf8cfd05fdb761a3d72fb0ba3b2192280c2deeec9914bbc860109673e4b5ad686239ea55f15c034882b2e8d22bb8d14ac606d0795658145cd678ef68b56fb1ecd6cf2b03c34e048fa83e2709d8f", 0x75, 0x80000001}, {&(0x7f0000000240)="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", 0x1000, 0x3}, {&(0x7f0000001240)="1f760e63bfa4793efcc634b0da6b6b19934e429a1cdf4ca1957a9a524ec3c6c72f00b785a38ba72878e499365f753e516dfc1ec2f5974601f124de4d9ab1774af104d525f2b33b7f0ec933aa8b5dd949ec7bcf488eeb0cbd9f4872da9720a684d104f50f486b4aeee143f048f008ac48c70d0a763632f5a6c051fae0ebaec0a6fa047cb842c63e541ccce2b90555bc4172f9cffca63232378ff7d6848c52444fcbe80ff7d9e32f7a7fbcc17182de00f2df283ac6435ac306fd4c8de76288e256caa6741fd64ed7215ce90e9acd2b453e8f92e0ede52c03640674ff693ba97db1206ed6e17972", 0xe6, 0x672}, {&(0x7f0000001340)="c040787a031b0091d43a115186e078cdc91a97015d99d7e3476ad9ff2d5a9b8c60bbf7fe06af5c62e7b1d2bee254941b9065a61e00d5569131fd538c900ea24efb43128d0c19ae6b07f241a7026a40fd6006d9a7c4706453b6e9b90f39f55652567b003a536c3ebdd9cfde624c00ea40e82876572993ccf622fbc20734665fbc583c59373ab5044bf968b3c4c1a742544993543ed844a7ebcbc32ae6c73f50e71dfa33b9c5384b4ca9c25d03ab21b4", 0xaf, 0xdb1}], 0x10, &(0x7f00000014c0)=ANY=[@ANYBLOB="6d78090000202e342f382d023a2c687567653d652c73697a653d317825743431382c733d616c777879732c646566636f6e93657874457379f374656d5f752c686173682c6f62735f726f6c653d746d706673002c0089b78b4cedc6fc6f4df7c53131390b1acc31b91ceb5a00"/117]) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000001540)='./file0\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:06 executing program 3: fsmount(0xffffffffffffffff, 0x0, 0xfc) execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) [ 149.465189][T30166] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 149.482089][T30151] loop2: detected capacity change from 0 to 16383 04:32:06 executing program 4: getpgrp(0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x0) [ 149.527533][T30151] nfs4: Unknown parameter 'uid>' 04:32:06 executing program 2: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc1}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x180800) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) r1 = accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x800) getpeername$packet(r1, 0x0, 0x0) 04:32:06 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x1, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 1: getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) setresgid(r0, 0xee00, 0xee01) fsmount(0xffffffffffffffff, 0x0, 0x0) 04:32:06 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:06 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:06 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000180)=0x80) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1324850e9cc03a90", @ANYRES16=0x0, @ANYBLOB="980f28bd7000fddbdf250500000008000600", @ANYRES32=0x0, @ANYBLOB="08000b00e4d631fb08003b0093fe0f47050029000100000008003200c100000008000b0081000000"], 0x44}, 0x1, 0x0, 0x0, 0x40080}, 0x4000) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x11}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4048000}, 0x40) [ 149.584801][T30197] loop0: detected capacity change from 0 to 264192 [ 149.593173][T30197] tmpfs: Unknown parameter 'mx ' [ 149.599292][T30151] loop2: detected capacity change from 0 to 16376 [ 149.607681][T30151] tmpfs: Bad value for 'nr_inodes' 04:32:06 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffb) fsmount(0xffffffffffffffff, 0x0, 0xfc) 04:32:06 executing program 3: execveat(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:06 executing program 4: r0 = getpgid(0xffffffffffffffff) r1 = getpid() ptrace$peek(0xffffffffffffffff, r1, &(0x7f0000000000)) waitid(0x0, r0, &(0x7f0000000080), 0x1, &(0x7f0000000100)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, 0x0) 04:32:06 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 04:32:06 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x8010, r2, 0x7e5d5000) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='@\x00', 0x0, r0) 04:32:06 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x15}, 0x14) 04:32:06 executing program 3: execveat(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 4: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffff9c, 0x40106614, &(0x7f0000000000)) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:07 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="d4000000070a05000000000000000000030000040900020073797a30000000000900020073797a30000000000cf63ebdea000000000000030900020073797a32000000008d0007606082b293506761bf5e73fcc52c2f71fbdd9988d46635ef680135263273e1fd0860d9fe3e1e026255985f5894b1253993b5bad1b13f1fc074ba5baa27b807b79a9b7b2b77e0ea65a01e7fa347e0677763d5e3eed21cd1d3f44004000000000000008ac9715f3c7029ab28ad4fec4b8b0b2580a3b1886a5ebdeb873634fd77cfef35764aef75a1e4eb0b35f164aaa67c"], 0xd4}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x881) socketpair(0x22, 0x4, 0x164, &(0x7f0000000700)={0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000006c0), r2) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)) socket$packet(0x11, 0x2, 0x300) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000600)=""/186) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/6, 0x6, 0x3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x680001, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r5, 0x0, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r5, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x60, 0x0, 0xb, 0x301, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_COMPAT_NAME={0x0, 0x1, '!{\x00'}, @NFTA_COMPAT_NAME={0xc, 0x1, ':\xdc-*\x1d\xc7F\x01'}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_NAME={0x35, 0x1, 'fo\x81\x88'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040001}, 0x40060) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x84, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x1d}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x1c}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x84}, 0x1, 0x0, 0x0, 0x4008040}, 0x20000000) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000480)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000880)=ANY=[@ANYBLOB="3400f4b8a4ab8c7f4b6986becc5171dbb6f8b3ba481680b5a3f47cf59a14cc14e6117e0ec11ce3a6c7a24de76b0e104e8ce7487fd4ac9428df194091e950fa2638bf84159d9a5c29e93252e79d6cf7dcb60000000056291a0bd6ea3169d3c1db00"/110, @ANYRES16=r6, @ANYBLOB="040023040000fddbdf25030000000500330000000000050030000100000008003c001f000000050035001f000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4800) 04:32:07 executing program 0: mmap$usbmon(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x12, 0xffffffffffffffff, 0x6c) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 1: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x80) 04:32:07 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:32:07 executing program 3: execveat(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[&(0x7f0000000540)='h2W\xc4~\xd4\x95\xdb.8\xa5\xd5\xae\xc6\xa4\xdb\xf1\xe2\xe8\x7fj{\xc5\xba\x8e'], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x103) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x7d) 04:32:07 executing program 4: pipe2(&(0x7f0000000100), 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x4800) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) socketpair(0x4, 0x4, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, 0x0) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x8020, &(0x7f0000000080)={[{@size={'size', 0x3d, [0x32, 0x39]}}, {@huge_advise}, {@huge_always}], [{@pcr={'pcr', 0x3d, 0x3b}}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, ':,],\\]*{]'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="a495645b459dad0d413de6429eaaac0c7104c8547e8b6272f8cdf8c908ebd6e9d8419ddb5568ce0ed208603cc125421063f1c2c1ed093ad7f2b959a8f92761a17396406636257a4ba2e9ce416dccaab296c6a15a88e6f5e4e25936f817fc47e2fd61ec02706dcc9cb2df400c70fbe2890e66ee4881b297f6727eeec75b740bf3ee8c1ab4d1d8800c294ae7deeba540306c3976821959395e8236e6954f7494536cd0a15c", 0xa4, 0x4}], 0x1008004, &(0x7f0000000180)=ANY=[@ANYBLOB="8969643d", @ANYRESHEX=0x0, @ANYBLOB=',mpol=bind,mpol=interleave,size=mEx9g-,mode=00000000000000000000007,nr_inodes=,huge=within_size,huge=advise,nr_inodes=0,smackfsfloor=+$,\x00']) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/disk', 0x139801, 0x12) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x80, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, 0x0, 0x0) mkdirat(r3, &(0x7f0000000400)='./file0\x00', 0x108) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000340)='/%)}\x80$@%\x00', &(0x7f0000000380)='./file1\x00', r2) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000240)=0x2, 0x1) renameat2(r0, &(0x7f0000000280)='./file0/file0\x00', r0, &(0x7f00000002c0)='./file0\x00', 0x2) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x0) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 04:32:07 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x80800) getpeername$packet(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) bind$packet(r1, &(0x7f0000000100)={0x11, 0x11, r2, 0x1, 0x4, 0x6, @local}, 0x14) 04:32:07 executing program 4: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:07 executing program 1: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1e0, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x120, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x15f8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x643d3879}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9a}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xc9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3c7b764a}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff3e8d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x48040}, 0x1) r0 = fsmount(0xffffffffffffffff, 0x0, 0xfc) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{0x99, 0x6, 0x2, 0x4}, {0x1, 0x9, 0x7, 0x7}, {0x0, 0x8, 0x2c, 0x7ff}, {0x0, 0x0, 0x2, 0x80}, {0x6, 0xca, 0x1f, 0x6}, {0x7, 0xf8, 0x6, 0x7}, {0x1e, 0x9, 0x6, 0x9}]}, 0x10) [ 150.037223][T30293] tmpfs: Unknown parameter '‰id' 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f0000000080)=0x80, 0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) connect$packet(r1, &(0x7f00000000c0)={0x11, 0xd, r0, 0x1, 0x1b, 0x6, @random="4edafef98c49"}, 0x14) [ 150.121014][T30293] tmpfs: Unknown parameter '‰id' 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000600)={@id={0x2, 0x0, @d}}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x5, 0x4) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x105284, 0x0) syz_io_uring_setup(0x12bc, &(0x7f0000000000)={0x0, 0x61ba, 0x20, 0x1, 0x2cc, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, 0x0, 0x0) renameat2(r3, &(0x7f0000000380)='./file0\x00', r4, &(0x7f00000003c0)='./file0\x00', 0x1) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) socketpair(0x11, 0x0, 0x2, &(0x7f0000000400)={0xffffffffffffffff}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r1) sendmsg$TIPC_NL_LINK_GET(r6, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="d00100004eb277ec20251fcce0e8f2989488d8cd2d3d4703962f15", @ANYRES16=r7, @ANYBLOB="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"], 0x1d0}, 0x1, 0x0, 0x0, 0x8880}, 0x24000000) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="10002abd7000fcdbdf251200000008002c00ff01000005002f0000000013a70005002a0001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x200c0080}, 0x4008814) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) socketpair(0x0, 0x3, 0x7fff, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x5, 0x101, 0x1000, 0x7ff, 0x8, 0xfffffffd, 0x80000}, 0x1c) sendmsg$FOU_CMD_DEL(r2, 0x0, 0x40040005) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x8c) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20008020}, 0xc, &(0x7f0000000c00)={&(0x7f0000000040)={0xbb8, 0x1, 0x5, 0x201, 0x0, 0x0, {0x3, 0x0, 0x3}, [{{0x254, 0x1, {{}, 0x2, 0x8, 0x1ff, 0x4, 0x1e, 'syz0\x00', "4781e8fd8657f972c9822776e517b3ff569793d50b3e10d3c34811590be044fd", "14e90a9d6bc967dc6817dd224c034fe97a395d97423530a54b24bcc48331efba", [{0x1, 0x59a6, {0x0, 0xc23}}, {0x8000, 0x7, {0x1, 0xffffff6c}}, {0x0, 0x0, {0x0, 0x20}}, {0xfffb, 0x40, {0x1}}, {0x80, 0x1, {0x2, 0x640}}, {0x400, 0x9, {0x1, 0x7}}, {0x2, 0x2d, {0x0, 0xfa}}, {0xdb3a, 0x3, {0x2, 0xffff}}, {0x401, 0xfded, {0x0, 0x10000}}, {0xc7, 0x6, {0x0, 0x81}}, {0xfffc, 0x9, {0x2, 0x7}}, {0x4, 0x6, {0x2, 0x1}}, {0x4, 0x5, {0x3, 0xb7f}}, {0x5, 0x0, {0x0, 0x8}}, {0xff01, 0x677c, {0x2, 0x7}}, {0x1ff, 0x8, {0x3, 0x127}}, {0x9, 0x7, {0x1, 0x1}}, {0x3f, 0x8, {0x3, 0x332e569f}}, {0xe96, 0x2, {0x1}}, {0x5, 0xc59, {0x3, 0x6e2}}, {0x3, 0x3, {0x0, 0x197}}, {0x1800, 0x2, {0x2}}, {0x400, 0x1, {0x2, 0x8}}, {0x3ff, 0x200, {0x0, 0x80}}, {0x3, 0x74c1, {0x3, 0x7fffffff}}, {0x7, 0x7, {0x2, 0x101}}, {0x7, 0x8, {0x0, 0x200}}, {0x3f, 0xeb14, {0x3, 0x8001}}, {0x1, 0xe3ea, {0x1}}, {0xe04a, 0x86f, {0x2, 0x3}}, {0xa53, 0x1000, {0x1, 0x4}}, {0x0, 0x0, {0x2, 0x4}}, {0x3, 0x81, {0x2, 0x1}}, {0x0, 0xffff, {0x1, 0x6}}, {0x7fff, 0x8, {0x0, 0x4}}, {0x0, 0x20, {0x3, 0x4}}, {0x9, 0x5, {0x2, 0x1}}, {0x3, 0x6, {0x0, 0x6}}, {0x0, 0xd4f4, {0x3, 0x11c}}, {0x7fff, 0x5, {0x3, 0x6}}]}}}, {{0x254, 0x1, {{0x1, 0x400}, 0x0, 0x0, 0x7fff, 0x7, 0x20, 'syz1\x00', "fafab3eba01334938f53747e79afd46c174c84b99f096c6124c28c474b5252c0", "3737d2c4ad76f4dadb6b5b3cc4c7a79c6b123e324a1d5462d6e4b29dfbe20b50", [{0x0, 0x1, {0x3, 0x2}}, {0x7fff, 0xfff7, {0x0, 0x3}}, {0x1, 0x5, {0x3, 0x401}}, {0x2, 0xe8, {0x3, 0xffff}}, {0x0, 0x3b, {0x2, 0x6459}}, {0x7, 0x100, {0x1, 0x7c}}, {0x2, 0x800, {0x2, 0x7ff}}, {0x97f, 0x9, {0x3, 0x7f}}, {0x7f, 0xc8e2, {0x1, 0x474}}, {0x6, 0x481, {0x3, 0x1}}, {0xa05, 0x0, {0x3, 0x2}}, {0x0, 0x5, {0x1}}, {0x6, 0xfffe, {0x0, 0x5}}, {0x1, 0x1000, {0x1, 0x3ff}}, {0xf329, 0x2a35, {0x1, 0x1ff}}, {0x4, 0x1, {0x0, 0x71}}, {0xa66, 0x40, {0x1, 0x20}}, {0x4, 0xe4ff, {0x1, 0x8e8}}, {0x0, 0x1, {0x3, 0xd4}}, {0x6, 0x8000, {0x3, 0x80000001}}, {0x1, 0x0, {0xa98ad487b3f9f0f9, 0x8}}, {0x101, 0xff, {0x3, 0x8}}, {0x4, 0xd173, {0x0, 0x1}}, {0x401, 0x2, {0x3, 0xc781}}, {0x81, 0x7ff, {0x2, 0x3}}, {0x20, 0x6, {0x0, 0xc9}}, {0x7, 0xf8b9, {0x1, 0x5}}, {0x7, 0x4615, {0x3, 0x5}}, {0x8, 0x4, {0x0, 0xd5}}, {0xe56, 0x1, {0x1, 0x5}}, {0x531, 0x5, {0x2, 0x100}}, {0x0, 0x6, {0x2, 0x8}}, {0x2, 0x5, {0x1, 0xed9}}, {0x5, 0x9, {0x3, 0x9}}, {0x1000, 0x39ab, {0x1, 0x3}}, {0x5, 0xe84, {0x2, 0xa0000}}, {0x9, 0x6, {0x0, 0x6}}, {0x8001, 0x81, {0x2, 0x3ff}}, {0x73, 0x8, {0x3, 0x8000}}, {0x1, 0x64d, {0x3, 0x2}}]}}}, {{0x254, 0x1, {{0x0, 0x1}, 0x4, 0x20, 0x4, 0x1, 0x11, 'syz0\x00', "bafdfca80a8b4bdd6a37c5d9e00de1757ba74d85b52b283a798397b2abaf488a", "30214701436672be2f7f590fc5c8d1e7b21e8118f98952fc524ae4984b9f382b", [{0xfff, 0xc5, {0x1, 0xff}}, {0x1d44, 0x927, {0x3, 0x7}}, {0xff7f, 0x5, {0x2, 0xff}}, {0x0, 0x0, {0x1, 0x5b}}, {0xc6, 0x1, {0x0, 0xfffff209}}, {0x1, 0x1, {0x0, 0x1}}, {0x40, 0x4, {0x0, 0x4803}}, {0x8f3, 0x20, {0x0, 0x100}}, {0x1ff, 0x9, {0x0, 0x100}}, {0x400, 0x6, {0x2, 0x1}}, {0x2, 0x6, {0x0, 0x2}}, {0x9, 0x1c, {0x1, 0x6}}, {0xc3f, 0x6, {0x2, 0x50d}}, {0x0, 0x9, {0x1, 0xadfe}}, {0x3, 0x8, {0x0, 0x80}}, {0x4, 0x369, {0x0, 0x9}}, {0x1, 0x6, {0x2, 0x80}}, {0x1f4d, 0x4abb, {0x3, 0xfffff6f3}}, {0x1, 0x1, {0x1, 0xffffff7a}}, {0x6, 0x100, {0x1, 0x3}}, {0xfff9, 0x3, {0x0, 0x400}}, {0xb6, 0x80, {0x3, 0x2}}, {0x8f91, 0x5, {0x0, 0xfffffffe}}, {0x7, 0x1, {0x2, 0x3ff}}, {0x3f, 0x5, {0x2, 0x20}}, {0x5, 0x4, {0x1, 0x8}}, {0x7fff, 0x64, {0x2, 0x5}}, {0x9, 0x6c8c, {0x3, 0x5}}, {0x1, 0x8000, {0x2, 0x10001}}, {0xea2, 0x872, {0x1, 0x40}}, {0x3, 0xb5a, {0x2}}, {0x4, 0x1, {0x0, 0x7}}, {0x2, 0x7, {0x1, 0x1}}, {0x7, 0x4, {0x2, 0xaaf6}}, {0x7fff, 0xfff, {0x2, 0xb72}}, {0x1, 0x100, {0x0, 0x101}}, {0x7, 0x8, {0x0, 0x7ce}}, {0x4, 0x7, {0x2, 0x2723}}, {0x0, 0x8, {0x2, 0xb3a1}}, {0xfff, 0x3ff, {0x2, 0x122}}]}}}, {{0x254, 0x1, {{0x1, 0x400}, 0x3f, 0x81, 0x6, 0xadd, 0x14, 'syz0\x00', "0b25f32d7eeb1077fdb523670e673a94bde555ac7916cba018f6c8c87dc38ccb", "b3b9e8bbf8e912b7e9b4e73e39aa3272545e4cd3706c54f6f7bd46bb4b4e80b4", [{0x3ff, 0x5, {0x2, 0x7}}, {0xb3, 0x5, {0x2, 0x56ae}}, {0x4, 0x81, {0x0, 0x6}}, {0x2, 0x5, {0x2, 0x10001}}, {0x3, 0x1, {0x1, 0x74e4}}, {0x2e5, 0x2, {0x2, 0x5}}, {0x7, 0x40, {0x1, 0x800}}, {0x100, 0x1ff, {0x3, 0x2c}}, {0xc28, 0x1e, {0x2, 0x5}}, {0x3, 0x2, {0x1, 0x7}}, {0x38, 0x200, {0x3, 0x8000}}, {0x8b, 0x648, {0x1, 0x1}}, {0x0, 0x0, {0x3, 0x1}}, {0x77, 0x1, {0x3, 0x7}}, {0x9, 0xfffb, {0x1, 0x7f}}, {0x40, 0x5, {0x0, 0x4a63}}, {0xfff, 0x0, {0x3, 0x1000}}, {0x7, 0x20, {0x2, 0x1}}, {0x0, 0x6, {0x1, 0x1f}}, {0x1, 0x4, {0x3, 0x7}}, {0x401, 0x8000, {0x2, 0x401}}, {0x9, 0xf42a, {0x2, 0xffff}}, {0x8, 0x3ff, {0x2, 0x81}}, {0x4, 0x4f, {0x3, 0x9}}, {0x7, 0x7, {0x0, 0x9}}, {0x1ff, 0x8001, {0x2, 0x1}}, {0x9, 0x4, {0x1, 0x87b}}, {0x2, 0x0, {0x2, 0x6}}, {0x80, 0x5, {0x2}}, {0x8000, 0x4, {0x0, 0x5}}, {0x1, 0x8000, {0x3, 0x101}}, {0xd1, 0x3, {0x3, 0xa9f3}}, {0x4, 0x9, {0x2, 0x3}}, {0x35, 0x3, {0x1, 0x10001}}, {0x3, 0x8, {0x1, 0x1800000}}, {0xfeff, 0xfff, {0x2, 0x482d}}, {0x1, 0x3ff, {0x2, 0x7}}, {0xfffa, 0x3f, {0x0, 0x1000}}, {0x97, 0xa18, {0x1, 0x4}}, {0x9, 0x7, {0x1, 0x8}}]}}}, {{0x254, 0x1, {{0x0, 0x3}, 0x7f, 0x3, 0x3ac7, 0x4, 0xd, 'syz0\x00', "1798bd5aa656317ffbc4c374d982ec1b9127b5078114130aa1ef0527f6fe82db", "69f0c9ed7af9901df1ad52eed174e64e7ae308f2bf1cbf0fb4efa7d5f823ede1", [{0x7, 0x0, {0x1, 0xffffffff}}, {0x57, 0x1, {0x3, 0x4}}, {0x2, 0x401, {0x2, 0x101}}, {0x49d1, 0x7, {0x2, 0x1}}, {0x0, 0x400, {0x2, 0x11}}, {0x4, 0xffff, {0x0, 0x7fff}}, {0x156, 0x81, {0x2, 0x5}}, {0x8000, 0x2, {0x2, 0x7f}}, {0xffe0, 0xa1, {0x1, 0x2}}, {0x7, 0x20, {0x0, 0xa1f}}, {0x1f, 0xffff, {0x0, 0x8}}, {0x4, 0x0, {0x0, 0x2}}, {0x858, 0x20, {0x3, 0x3}}, {0x5, 0x7, {0x2, 0x6}}, {0xc03, 0x57c6, {0x0, 0x8001}}, {0x100, 0xfc00, {0x3, 0x1}}, {0x8, 0x3, {0x1, 0x7fff}}, {0x9, 0x1c5, {0x0, 0x3ff}}, {0x7ff, 0x8, {0x3, 0xd8}}, {0xd5b, 0x3, {0x0, 0x1000}}, {0x2, 0x7, {0x3, 0x7}}, {0x0, 0x7, {0x0, 0xa6a}}, {0xfffb, 0x2, {0x2, 0x6}}, {0x400, 0x4, {0x3, 0x100}}, {0x4bf, 0xfff, {0x0, 0x8}}, {0xad40, 0xfff, {0x1, 0xddde}}, {0x6, 0x9, {0x2, 0x3f}}, {0x9, 0x7fff, {0x3}}, {0x9, 0x0, {0x2, 0x7}}, {0x6b, 0xfffe, {0x3, 0x4}}, {0x2, 0x6e77, {0x0, 0x7}}, {0xab, 0x104, {0x1, 0x17}}, {0x5, 0x9, {0x1}}, {0x2, 0x4a, {0x0, 0x3}}, {0x1, 0x6, {0x0, 0x4}}, {0x240, 0x7e, {0x0, 0x2}}, {0x9, 0x4, {0x0, 0x2}}, {0x7, 0x1000, {0x1, 0xffffff00}}, {0x5af, 0xe6, {0x0, 0x6}}, {0x4a2d, 0x7, {0x0, 0x6}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x1}, 0x1400c000) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r1) 04:32:07 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r1) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c4, r2, 0x10, 0x70bd26, 0x25dfdbf9, {}, [@TIPC_NLA_BEARER={0xac, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8be5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x85}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x152}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000001, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xbc}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_SOCK={0x90, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x20000000}, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) 04:32:07 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x10, 0x80, 0x3, 0x401, {{0x15, 0x4, 0x1, 0x1, 0x54, 0x68, 0x0, 0xc6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x18}, @loopback, {[@timestamp_prespec={0x44, 0x14, 0x96, 0x3, 0x0, [{@multicast2, 0x2}, {@broadcast, 0x7c}]}, @end, @ssrr={0x89, 0x27, 0xd8, [@broadcast, @multicast1, @remote, @remote, @local, @multicast2, @local, @multicast1, @loopback]}, @noop]}}}}}) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) 04:32:07 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing', 0x101000, 0xcb) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) socketpair(0x6, 0x4, 0x0, &(0x7f0000000040)) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x7f, 0xffffffff, 0x32af, 0x990, 0x4, 0x380, 0x55}, 0x1c) 04:32:07 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/srcutree', 0x800, 0x42) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000d00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000100)={0xbb8, 0x1, 0x5, 0x101, 0x0, 0x0, {0x5, 0x0, 0x6}, [{{0x254, 0x1, {{0x0, 0xffffffff}, 0x7, 0x9, 0x6, 0xfc00, 0x7, 'syz1\x00', "04a3b3463e1164f12578f5ecc78c533a5313ad98db859eb402a8707f05d63307", "4576cf3b0e99e8b76df6b22e085ee8b7b4835cd284a64a047b66ee2010c72356", [{0xff, 0x75, {0x0, 0x9}}, {0x8, 0xbb6e, {0x3, 0x6}}, {0x4, 0x9, {0x0, 0x4}}, {0x0, 0x4, {0x0, 0x20}}, {0x8, 0x3ff, {0x1}}, {0x1, 0x8e4c, {0x2, 0xfffffffd}}, {0x8, 0x101, {0x3}}, {0xfff, 0x7, {0x1, 0x8001}}, {0x5, 0xa4f, {0x1}}, {0x7fff, 0x1502, {0x2, 0x2}}, {0x0, 0x5106, {0x2, 0x1}}, {0x49, 0x6, {0x0, 0x1aec55d1}}, {0x5, 0xde6, {0x2, 0x80000000}}, {0x6, 0x9, {0x2, 0xd2}}, {0x0, 0x1f, {0x1, 0x3ff}}, {0xff, 0x9, {0x2, 0x1}}, {0x7f, 0x1, {0x1, 0x2}}, {0x1000, 0x7f, {0x2, 0x3}}, {0xf616, 0x8000, {0x3, 0x9}}, {0x2, 0x2, {0x3, 0x17b5}}, {0x9, 0x1000, {0x1, 0xffffffc1}}, {0x401, 0x3, {0x0, 0x1000}}, {0x8001, 0x200, {0x3, 0x7}}, {0x6, 0x401, {0x1, 0x8}}, {0x67cd, 0x6, {0x0, 0x4}}, {0xffe0, 0x5, {0x3, 0x6}}, {0x65bc, 0x3ff, {0x2, 0x5}}, {0xb4, 0x5, {0x3, 0x8001}}, {0x1c, 0x6, {0x3, 0x4}}, {0x1, 0x7fff, {0x1}}, {0x8000, 0x200, {0x1, 0x7}}, {0x8, 0x5, {0x2, 0x1}}, {0x8cc, 0x9, {0x0, 0xffffffff}}, {0x0, 0x20, {0x3, 0x662ee3d4}}, {0x9, 0x1ff, {0x1, 0x8}}, {0x3, 0x6, {0x3, 0x9}}, {0x1c, 0x5, {0x2, 0x3}}, {0xff, 0x7b, {0x0, 0x9}}, {0x8f12, 0x8, {0x0, 0x5a1}}, {0x101, 0x8, {0x0, 0x8}}]}}}, {{0x254, 0x1, {{0xa02ae67a69fe61fe, 0x300}, 0x40, 0x0, 0xd5, 0x6, 0x6, 'syz1\x00', "31af100f1d88e551f393bb887d087c3ec3ddb22790bdfdb5969a13631cbc3922", "e49535561aba5c5917901c86ca46eb60ef89fde0aca8f414aca3810c67d1c51f", [{0x7, 0x6, {0x0, 0x8}}, {0x0, 0x1, {0x2, 0x4000}}, {0x0, 0x7, {0x5, 0x7}}, {0x3, 0x81, {0x3, 0x3f}}, {0x3f, 0x9, {0x1}}, {0xffff, 0xffff, {0x0, 0x100}}, {0x101, 0x1f, {0x0, 0x4}}, {0x5, 0x0, {0x0, 0x40}}, {0x5, 0x9, {0x0, 0x8}}, {0x75, 0x2}, {0x143, 0xd6d, {0x3, 0x5}}, {0xa785, 0x1d, {0x0, 0x4}}, {0x4, 0x1, {0x2, 0x6}}, {0x9, 0xf9e6, {0x3, 0x401}}, {0x3, 0x51, {0x1, 0x8}}, {0x2, 0x1f, {0x0, 0x3ff}}, {0x2, 0x5, {0x1, 0x7}}, {0x3, 0x1, {0x3, 0x7}}, {0x100, 0x40, {0x1, 0x8000}}, {0x2, 0x2, {0x0, 0x7}}, {0x8f, 0x2, {0x7, 0x2}}, {0x0, 0x200, {0x0, 0x8}}, {0x0, 0x8001, {0x3, 0x9}}, {0x0, 0x3, {0x3}}, {0x3f, 0x8, {0x0, 0x5}}, {0x3, 0xa21a, {0x3, 0x4}}, {0x3782, 0x6, {0x3, 0xd2}}, {0xfffc, 0xffc2, {0x3, 0x6}}, {0x2, 0x1, {0x0, 0x6}}, {0xfffc, 0x6, {0x1, 0x3}}, {0x9, 0x0, {0x1, 0x200}}, {0xfe, 0x3, {0x3, 0xcc1}}, {0x9, 0xa73, {0x2, 0x8}}, {0x3c, 0x5, {0x2, 0x9}}, {0x7, 0x7, {0x1, 0x2}}, {0x6015, 0x2, {0x0, 0x89}}, {0x9f8c, 0x5, {0x2, 0x6}}, {0x9, 0x0, {0x3, 0x46800}}, {0xfaa, 0x2, {0x3, 0x1}}, {0x0, 0x2, {0x2}}]}}}, {{0x254, 0x1, {{0x0, 0x3}, 0x6, 0x9, 0x6, 0x7, 0x16, 'syz1\x00', "82e5022469b9867cf4281fc6a5f3e4d06edc5f913d1c82df6aab2b40f14e9251", "3a5c8bd358305a1bae64a926ac54357b6f15faf2a9268c8bb4a787cc2875bb64", [{0x3ff, 0x8, {0x3, 0x9369}}, {0x3, 0xb751, {0x3, 0x80000001}}, {0x0, 0x6, {0x2, 0x4}}, {0xfc01, 0x4000, {0x1, 0xd1}}, {0xaaa7, 0x7ff, {0x0, 0x7fff}}, {0x2, 0x6, {0x2, 0x3f}}, {0x7, 0x1f, {0x1, 0x3ff}}, {0xb7a, 0x2, {0x1, 0x7}}, {0x3, 0x0, {0x0, 0xfffffff7}}, {0xfffe, 0x3, {0x0, 0x99f}}, {0x3, 0x5, {0x2, 0x7}}, {0x0, 0x401, {0x2, 0x200}}, {0x9, 0x5, {0x0, 0x750}}, {0x2, 0x4, {0x3, 0x2}}, {0x0, 0xf800, {0x2, 0x9}}, {0x33, 0x5, {0x3, 0xafa}}, {0xff, 0x4, {0x2, 0x1ff}}, {0x800, 0xb7, {0x1, 0x7ff}}, {0x303, 0x6b6, {0x2, 0xff}}, {0x4, 0x5, {0x0, 0xb5c1}}, {0x4, 0x3, {0x0, 0x40}}, {0xc4, 0x9, {0x3, 0x4}}, {0x0, 0x8, {0x2, 0x20}}, {0x5, 0x23, {0x0, 0x7}}, {0x101, 0xbc4, {0x0, 0xb2c}}, {0xf4d2, 0x1f, {0x0, 0xfffffffd}}, {0x1, 0x7ff, {0x3, 0xfffffbff}}, {0x2, 0x9, {0x3, 0x1000}}, {0x3, 0x4, {0x3, 0xcb}}, {0x6, 0x0, {0x2, 0x5}}, {0xffff, 0xf5, {0x2}}, {0x401, 0x2c2, {0x1, 0xdc5}}, {0x6a, 0x7, {0x3, 0x10001}}, {0x1, 0x9, {0x2, 0x8}}, {0xb8, 0x3ff, {0x2, 0x5}}, {0x37, 0x6, {0x1, 0x5}}, {0x40, 0x2, {0x1, 0x2}}, {0x5, 0x7, {0x2, 0x2}}, {0x18b, 0x2, {0x1, 0x4e}}, {0x200, 0xc6d, {0x2, 0x9}}]}}}, {{0x254, 0x1, {{0x0, 0x7}, 0x2, 0xf8, 0x3f, 0x8, 0xd, 'syz1\x00', "fd93dcd522ee3ed203047cc884435ae57f5f3dbecc389a5d93e62c170332e0a9", "89ba537f623a8553848136b52ef9e326a5de5415d792876fd75a46bd0d390388", [{0x4, 0x6, {0x2, 0x101}}, {0x9, 0x40, {0x2, 0xffff}}, {0x2, 0x3f, {0x1, 0xad0}}, {0x47f5, 0x8000, {0x2}}, {0x8, 0x1, {0x0, 0x1}}, {0x81, 0x0, {0x0, 0x24}}, {0x7, 0x1, {0x3, 0x5}}, {0x2, 0x1, {0x3, 0x1}}, {0x4, 0x2, {0x1, 0x7fff}}, {0x7fff, 0x7ff, {0x1, 0x7}}, {0x7f, 0x4}, {0x0, 0x1, {0x0, 0x2}}, {0x8e0, 0x2, {0x1, 0x2d}}, {0x2, 0x7, {0x0, 0x7}}, {0xd1c, 0x272c, {0x1, 0xc2ac}}, {0xa000, 0x1ff, {0x3, 0xd72}}, {0x7, 0xa0, {0x2, 0xb8d7}}, {0xbf3, 0x101, {0x2, 0x7fff}}, {0x200, 0x5b1, {0x2, 0x1ff}}, {0x0, 0x7, {0x1, 0x450}}, {0x4, 0xf000, {0x3, 0x5}}, {0x8, 0x14, {0x0, 0x3847}}, {0x7, 0x7, {0x1, 0x8}}, {0x8, 0x81, {0x1, 0x5}}, {0x9, 0x7ff, {0x2, 0x8001}}, {0x6, 0x9, {0x0, 0x3ff}}, {0x400, 0x9, {0x2, 0x1}}, {0x40, 0x101, {0x1, 0x2}}, {0x8af4, 0x0, {0x0, 0x1ff}}, {0x8d, 0x1000, {0x1, 0x1}}, {0xfffa, 0xffe0, {0x0, 0x4c14}}, {0x800, 0x6, {0x3, 0x3}}, {0x7ff, 0x6, {0x1, 0xfffffffd}}, {0x4d, 0x1, {0x7cb759b7e2e931ed, 0x7}}, {0x3f, 0x9, {0x3, 0x1}}, {0x401, 0x20, {0x3, 0x8}}, {0x800, 0x6, {0x0, 0x100}}, {0x40, 0x7fff, {0x3, 0x20}}, {0x6, 0xfff, {0x1, 0x7}}, {0x0, 0x3, {0x3, 0x60000000}}]}}}, {{0x254, 0x1, {{0x3, 0x3}, 0x8, 0x4f, 0x3, 0x101, 0x23, 'syz1\x00', "1def81cc89ff2c5a0c5b3f0aed157ce26484bda30dac45ba48857f627c3f4568", "c2e1750973a0adf96934932974de0571793cab8d843ad78d5818af84b947f16c", [{0x0, 0x8001, {0x3, 0x3e000}}, {0x401, 0xfff, {0x1, 0x7fff}}, {0x0, 0x7, {0x1, 0x9}}, {0x5e18, 0x7, {0x2}}, {0x5, 0x1, {0x2, 0x9}}, {0x2, 0x12, {0x2, 0x4}}, {0x3ff, 0x2971, {0x2, 0x9b33}}, {0x5, 0x401, {0x1, 0x4}}, {0x1000, 0x3fb8, {0x2, 0xffff7fff}}, {0x9e, 0x6de, {0x3, 0x8f}}, {0x7ff, 0xa26}, {0x4, 0x0, {0x2, 0x7}}, {0x1, 0x6, {0x1, 0x7}}, {0x8, 0x7ff, {0x2, 0x401}}, {0x4, 0x7358, {0x1, 0x7}}, {0x20, 0x6a7, {0x2, 0x9}}, {0x7, 0x9d9b, {0x1, 0x10001}}, {0x67, 0x3, {0x1, 0x6}}, {0xff, 0x69b, {0x2, 0xffff}}, {0x3, 0x14, {0x3, 0x5}}, {0x800, 0x485c, {0x0, 0xc19}}, {0x9, 0x3, {0x1, 0x80000001}}, {0x3c, 0x871b, {0x0, 0x1}}, {0xc89, 0x9}, {0x6, 0x0, {0x2, 0x7fff}}, {0x8, 0x8000, {0x1, 0x9}}, {0x9, 0x1, {0x3, 0x9}}, {0x9, 0x401, {0x1, 0x1}}, {0x76, 0x3, {0x0, 0x80}}, {0x9, 0x922, {0x1, 0x7f9f}}, {0x96f, 0xfffd, {0x1}}, {0x2, 0x2, {0x2, 0x200}}, {0x3, 0x5, {0x2, 0x80}}, {0x200, 0x81, {0x2, 0x40}}, {0x1f, 0x6, {0x2, 0x8}}, {0x48, 0x543b, {0x0, 0x8000}}, {0x1, 0x800, {0x2, 0x34}}, {0x4, 0x1, {0x0, 0x100}}, {0x7ff, 0x1, {0x3, 0x1}}, {0x9, 0x5, {0x2, 0x5}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x4040810}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80000) 04:32:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x2, 0x4) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x80) fsmount(r0, 0x1, 0xf9) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xa) 04:32:07 executing program 4: pipe2(&(0x7f0000000100), 0x84000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) pipe2(&(0x7f0000000100), 0x0) 04:32:07 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 04:32:07 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/76, 0x4c, 0x2020, &(0x7f0000000080)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random}, 0x14) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x56, 0xfff, 0xcf5f, {0x0, 0x401}, {0x2cc, 0x8}, @period={0x0, 0x3a, 0x69, 0x9, 0x4, {0x9, 0xfd0a, 0x4901, 0x9}, 0x1, &(0x7f0000000000)=[0x0]}}) 04:32:07 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x9800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x5, 0x2668, 0x24, @private1, @mcast1, 0x7, 0x1, 0x9, 0x8}}) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x260480d1) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) 04:32:07 executing program 2: ioperm(0xbe5, 0x5, 0x1) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x8100, 0x0) mknodat$null(r0, &(0x7f0000000100)='./file1\x00', 0x800, 0x103) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x17, 0x0, 0x1, 0x7, 0x6, @broadcast}, 0x14) 04:32:07 executing program 0: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x1) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, 0x17, 0xa, 0x3, 0x0, 0x0, {0x12, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) faccessat2(r1, &(0x7f0000000600)='./file0\x00', 0x8, 0x1200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r4 = accept4$packet(r2, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14, 0x800) connect$packet(r4, &(0x7f0000000700)={0x11, 0x5, 0x0, 0x1, 0xff, 0x6, @broadcast}, 0x14) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000280), r5) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={0x148, r3, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0xf8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb2, 0x3, "37b70e3acbe32ee97a60fc308df793f5933103d9b11c48739ba2706a01e70dba5efa4566f8c11b4673cdb0ff8204e33497cd677d46493f6ab91c312bb76880f046688002a2b9fee99039e7cf6ad5e12606a3071b2cd8d4b835da9b7c66e2e4ed857d06a573c9b7094a619b8533423f3666f7a7ec99ad33f7e1230542906d32ecddbd0f1a8cbe0b3c4f3175adb31a9cad42dc1406ebacbad181328b0c37bc9290632f0c8a5e0e1bc0451f6c0c5127"}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "025ee64f38b8765c7d66beecb88cde1552b7a48037b38cbc"}}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40008}, 0x810) r6 = fsmount(r5, 0x0, 0x84) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r7, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r7, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8000}, 0x4) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0xf, 0x6, 0x202, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4041}, 0x0) setsockopt$packet_int(r6, 0x107, 0x13, &(0x7f0000000640)=0x2, 0x4) 04:32:07 executing program 1: fsmount(0xffffffffffffffff, 0x0, 0xfc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xc04, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000100), 0x0, 0xfffffffffffffffb}, {&(0x7f0000000140)="6fb5ca46696d71eefb055bc7c9b435e2b373b223454ea7dbd986ecab0949da6198013475e6a4780afbc511b5eae90798f174a94c037c5e75b777771d15d6bdd2e5c50bccc413ceffc0c979172741d6b85430598a6a9ca4e101d06d0db100b343d74d833ba2fc49a5c9fa67075e09dd371dfab67ea9d5eb01ec59141258d2bc6310c58051891a5a6222296d2f044af9818271dd63267a77750c9fa5d9", 0x9c, 0xffffffffffff50b7}, {&(0x7f0000000200)="9818469b712a0fa914216ed788f4074abb6c486bda59661065bbe09b5c74a838eb91fa3e4e37e50adc9ca5f88d600dcd8d8c2a77aa3e9accee17ae2fed9e377e6f079c015f5ef343dccc54a1cfb0de7e553722f09c6150f87a1ac38e439e169685b21edad788b6bbc01c40d3e14e1f112cf52ab7b3ff0ffb0fd98dde6dadc6c288c939bcc9370c90e47fa5b4de9824d34a4ddec8c76cb8f09addd6f4ff2a33b1736209592045cbbd827566aa93a12ce3b524cb82a51ecf4741bae7289b2031658be8674295a0288d3314e20e6aee21a7327793442a0fc1357f8fe707cd2e8d5aa71f1777da77f1c5981bce906e4eacb9", 0xf0, 0x2}, {&(0x7f0000000300)="0fa5098146a0c38ffbf011b91bb003130ec3e24fe154f7cac94a9afb10bc67e9d0d42b6dec3b4695249e42101384e9d365b915f253f950e80afc53b0c962166b8106f783d0beb70e26a6bdd3bcf960fad7f90b852c685dbf25b9786006f91a00ad79a0b618562cf8dee4dd2f2ef46a1581eb51fe215030b52cdd3d724e4ae715c27181cdda7cd3c785373479c065964f9d8562743520fee36c5acb718fff6beec64f06b280660eb7a4e3eb4fa536e2fdd429881bf02cf52dced0da691b5505e13b724cbccf18049027e911ec9436da0182baf3de2c7742fb0aec7794", 0xdc, 0x1c}, {&(0x7f0000000400)="b3e2f91c6d432d7d2e31a7b3a929dbea832ca445d11e3c2d4e984ad78aa3e792a43c4e6d829e52113931c6313fff93ece345a590cc5e1e6b1b6346ea5c471df1de9d9d94c4b1a2591a9a9e06ca8baa17c12748817eb25468e5414de42b39677b6d53b20a346a83b5145c98eef3e35aa94b362d1bc54c96ddbaefa7d7db5bf17ed5754e583e0014d23009c315cfe7773e0c5d76b44a2c480a885a7b7a3dcbec5b95f969a0bdd87bc0862ff1f15e167a5a3a8aa1541261ac23ff00623db4349261d4577d5373f7ccd1ee", 0xc9}, {&(0x7f0000000500)="30458d0cdc05dceb0786da77efed175f8f428cb381eeb540a40cc1a257b3209d1d3816bc1d13c89f9446d6105c48d24bd93d0584d425335da798ffe63f341c6861d7b643694b0cf4e9e6214191801dda14b7dd17a7db775d721955cc4cf04e7a33d02004914e20f830097907ec26282e0d14ab307833a0b40b43f17afe3f5588e0", 0x81, 0x5}, {&(0x7f00000005c0)="69dccf1e95b19378464f81efa095292fe0d706e6fff9cad5c91a0dd7451f62ddc2f06b3df7742afb6dda311d2c7e6746e0cdfd6bba2b3d45769f3f98f33910d03a19d998413dd3b385a18114f75b3fcdf35bbf34902f1ee6ab7d0366f46da1ded6f2b1f8e8e2e7381249b04712e51ea684fad75b493a60fabf947d36cbd4fec5ecefa0286b49bcfead292371ea0b34d0561c07c6c9ed0e6790456f69f0f33dff28b9ce3323248d9d71e4be4ef196d42e36e4e35c73d07df34abdaa604f46b533c9965e4fedf2b48377197c99", 0xcc, 0x1}], 0x1014002, &(0x7f0000000780)=ANY=[@ANYBLOB='i_version,max_h_time=0x0000000000006c02,fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',fsname=@]/,dont_appraise,context=unconfined_u,\x00']) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='&}!-\x99$}^\'--{$\x00', &(0x7f0000000040)='./file0\x00', r1) 04:32:07 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000500)=[&(0x7f0000000400)='*+#])*\x00', &(0x7f0000000440)='#](\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='-\\\'!}-{$\\]-@,\x00'], 0x100) 04:32:07 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r2, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000009, 0x10, r2, 0x8000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @a}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 04:32:07 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x101, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) 04:32:07 executing program 2: socketpair(0x3, 0x1, 0x1f, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/processor', 0x4080, 0x11) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="5f007f000000425650173da4660e1029889c4924e396f703680661175e33875eeff89e4ba83f9347c2b6b8304319516a878ff3e14e06b051607459647774def721325576255747e553f2f3ef707a4db8bddc6ac5ac1acb054843fe7a9d2c57a048d91f3b2ee5c863c428f61069b449b2005694e5f272b402db620b3a32c85fdc023484c51fdba4153074d22abf386c564f57b3224a3164e43570750b6b394541c0271265e35266726cf5b439e3683502c4744defc91ea465d94367c50b5225bb903547beae2fb8ef457cb4822932059454a454c50441f99822f6ad6d548ea2", @ANYRES16=0x0, @ANYBLOB="000128bd7000fedbdf2502000000050004000100000008000600ffffffff060001004e22000004000500060001004e200000050004000100000014000900fe80000000000000000000000000001e14000900ff010000000000000000000000000001"], 0x68}, 0x1, 0x0, 0x0, 0x4001040}, 0x2000c8c8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r1) sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x1364, r5, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x124, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "79e7ffdec71d83a5b0fad6b3738333ff01c395ad065503c529c8127e79"}}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "44a0d9665b3afd992d4564b3f9025a5d320a8bdd840eee40f5e80657f60304fbe92b"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x53f3b600}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ID={0x3f, 0x3, "25078a31a4ed2a071b45db966737dad44713bbdbc1a661d6c032301728074c4d2f5f0be728fd75f0086d9e1ee79462fcfba147a9f57ac66f82f66c"}, @TIPC_NLA_NODE_ID={0x20, 0x3, "64079cd325fec79dced02a5b94452f240f66cccc7a29e1e6530610c1"}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_BEARER={0xc8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x37}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xd, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @mcast1, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa85}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf31}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x84, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x200}}, {0x14, 0x2, @in={0x2, 0x4e22, @private=0xa010100}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_NODE={0x1020, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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