0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x60, r6, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 00:24:19 executing program 1: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 00:24:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x0, &(0x7f0000000400)={0x2, 0x0, 0x100000000000000}) 00:24:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) 00:24:20 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:20 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffe50) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000380)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x3, @random="b12d85450fa8", 'rose0\x00'}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)="5c6eb8069abfc59c14749029d7c65b37c5fe9ee195b60a619465782344af1c0a6cf6af70764a9769ae31218f4bc73352b858b2d5c5cd3e344e341c142208cf12f86d414fce984c5b9647cddc16ab256cd0755e79b68cc48431360c1a15031eebb651b8cedd14a83f46b0c1", 0x6b}, {&(0x7f0000000100)="a4001e6588b7b3d394db72bb421eb66431c60cc79bb2d3d3b768342c6c3032b694c9dee03382af9b2b4b181fb8f2a7a17c3e5728", 0x34}, {&(0x7f0000000140)="571714", 0x3}, {&(0x7f0000000180)="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", 0xfa}, {&(0x7f0000000280)="6e97487127f049131bc4a19b1eb69e04cc1752dd6be3473781123c5762d01df9b92168eef7a6580c1491c61688c2d58c57f037fdae193dfacd10f4ecc9d552f695a3368e25fc0ba6e64e6071a34898", 0x4f}], 0x5}, 0x4004094) 00:24:20 executing program 1: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 00:24:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r8 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r8, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r8, 0xc0045540, &(0x7f0000000200)=0x7) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r7, 0x301, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x34, r7, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x8000001) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000000000b043a6f11c501801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) 00:24:20 executing program 1: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 00:24:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, 0x0, 0x0) 00:24:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x1c}}, 0x20000880) 00:24:20 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:20 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) sendto$phonet(0xffffffffffffffff, &(0x7f0000000180)="a365f978debb23b2b412b15375d65cd6dbb265fc8d6a5a828bf8a44bc93403582f21f6e124609c81bdf1c0f8444d321cf4c161874e569c903b771a4bd0c23268b4cd6f06bcb0c9fead8a296a862eac81119b8c38fc99d475b46da22d60d022a26dc0a67ae449daa676c75b8b0daef96b7ff708ec65daa4f62cdaa3bd0e4563cbfe20001521a494e2ba77eb389cff771b1a2e53a9d489badc6e5e662b7b47a34c44309582fc5bd7d1a4a5cfaada2112", 0xaf, 0x4000004, &(0x7f0000000240)={0x23, 0x9, 0x4c, 0x3}, 0x10) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x400080, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="80001f00020601030000000000000000030000071c000780080000090500030005000306c348dad2b052df5de42264242090670000001400078008001240000000020500150001000000240007800800094000000003050014000400000008000b400000800108000b4000090001050004000000000005000100"], 0x80}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) 00:24:20 executing program 1: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 00:24:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x0, &(0x7f0000000400)={0x2, 0x0, 0x100000000000000}) 00:24:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:24:21 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vcan0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r5, 0xc0044dff, &(0x7f0000000080)=0xffff) r6 = memfd_create(&(0x7f0000000000), 0x0) r7 = fcntl$dupfd(r4, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000280)={0x362, 0x3c, 0x2, 0x10001, 0x1, 0x1}) sendmsg$NFNL_MSG_ACCT_DEL(r7, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="680000000307010100000000000000000100ed0a0c00064000000000004004001c000780080002400000000408000140000003ff0800014000000d4b0c000340000000000000000408000540000000020c00024000000000000000020c0003fffffff2ea00000000"], 0x68}, 0x1, 0x0, 0x0, 0x8001}, 0x20000000) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r8, 0x401) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r8, 0x40044103, &(0x7f0000000380)=0x200) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="2c000000f39df7c3b2889aa10620d2dd3d778d74a60e72226f13201670d4a53944704bcd4a20c3d5f61f35f1e0aa7601f54bd340c0f950b0b6a639e5b1861875a216641f187ddb8d6d1fdb81d4a5f1", @ANYRES16=r9, @ANYBLOB="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"], 0x2c}}, 0x0) 00:24:21 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab7"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x60, r6, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 00:24:21 executing program 0: socket$rds(0x15, 0x5, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x30000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCGETS(r0, 0x5405, &(0x7f0000000000)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="402406e90bd3fa3f6f334be380bbebf961af26d159cd5e2cadae9d875e76641e23153d4bd6e01e7e92a8830f26ab27abb198ad68dcccdec4752af5eb627796832b147afcc43862a0bba92016fe5f9309c44b9682d8435957d2174ef6145b00"/120, @ANYRES16=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0ce) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x0, 0x48, 0x14000, 0x5, 0x7, 0x3, 0xfffffffffffffc01, 0x5, 0x6}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x104) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x8800) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x1, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x5b) 00:24:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:24:21 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab7"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="80000000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf250b000000180001801400020076657468315f766c616e000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) 00:24:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:24:21 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0x9, 0x68}) 00:24:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x60, r6, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 00:24:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, 0x0) 00:24:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)}, 0x0) 00:24:22 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab7"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000040)) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000222991cb7ffffffff73e03fa54800c5d47f02ad98f738891ea102850911ba862e4504dbc9619b686039cfbef3b3ce45b1564eddb23ee3db1e23b7893797be807d7e9eb3b04a59a9af8d2e0ed0a69b117ded441f576d", @ANYRES16=r4, @ANYRESDEC=r0], 0x2c}}, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) 00:24:22 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x60, r6, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 00:24:22 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xff1b) 00:24:22 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)}, 0x0) 00:24:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab7"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$packet(0x11, 0x2, 0x300) r6 = memfd_create(&(0x7f0000000000), 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r9, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000180)={{0x3, 0x0, @descriptor="e215da55d2a73aac"}}) sendmsg$DEVLINK_CMD_SB_POOL_GET(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xa0, r9, 0x0, 0x70bd25, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x800}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x81}, {0x6, 0x11, 0x8}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x890) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)}, 0x0) 00:24:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, 0x0) 00:24:23 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:23 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:23 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xff1b) 00:24:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)=[{0x0}], 0x1}, 0x0) 00:24:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400004, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@remote, 0x61}) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f00000000c0)={0x2, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x5681eb1fe737c691) fcntl$getflags(r5, 0x401) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r6, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="8000070000000007000000404a08002800640000050490780000000064010101890b9500000000ac1e00014408203000000008004b634345dcdd46dc3c8b253e4041f521a5782341f86deda7728f7e8673e47d832da0068481f987"]}) r9 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r9, 0x400, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="ad656fbb8f3fd5167530b5a0c9bf47ec70570001", @ANYRES16=r4, @ANYBLOB="000100000000000008000b0000004c02038008000200060000004e000400769ec74571bd26bda7815628feaa6761cc80ff44b2c954af45c7823dc66ca1967b9664a4d19d218c3f574001c00dfb213d46d12592d77e45e2949bfae1f77f0f4f65bf47f4737d162124000008000200040000002c0004002e026b8a323a6300615d9189ff589bbda1d019e84800d3f4b25f24b1c674c33aac78e946087df9cb1401038010000180040003000600020029000000100001800c00020073797a746e6c310030000180040003000a000200766c616e3100000008000100020000000400030004000300040003000800010080000000340001800a000200766c616e31000000060002002a00000008000100f8ffffff0c000200657468746f6f6c00080001000100010028000180040003001a0002002f70726f632f636170692f6361706932306e6363690000000400030040000180080001000400000004000300080001000100010008000100fdffffff08000100ff00000004000300040003000800010002000000060002002b000000240001800a000200766c616e3100000008000100020000000a000200766c616e3100000008000200090000000800020006000000210005005d2fc3f22343ecf7d3bdfd6dbc0a3d0d38887d70cbb6f170e12cb3125f0000006f000400a3fe437636999d94fac71c013878456cd73ed14f161465183c5b6ab5fba4013dd0086023dc7e9da1d9898899033167d63b781438abf23365fb5465336f849ef502935bd1f0680bcfa95c763a8f86e7812dde6d8291db144170647d1815211d2ee5bc495ae20173e632fd6c0004000100"], 0x260}}, 0x0) 00:24:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)=[{0x0}], 0x1}, 0x0) 00:24:23 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:23 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x3a) 00:24:23 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xff1b) 00:24:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b600)=[{0x0}], 0x1}, 0x0) 00:24:23 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xff1b) 00:24:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, 0x0) 00:24:23 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:23 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:23 executing program 5: socket$rds(0x15, 0x5, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x30000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCGETS(r0, 0x5405, &(0x7f0000000000)) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="402406e90bd3fa3f6f334be380bbebf961af26d159cd5e2cadae9d875e76641e23153d4bd6e01e7e92a8830f26ab27abb198ad68dcccdec4752af5eb627796832b147afcc43862a0bba92016fe5f9309c44b9682d8435957d2174ef6145b00"/120, @ANYRES16=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0ce) sched_setattr(0x0, &(0x7f0000000340)={0x38, 0x0, 0x48, 0x14000, 0x5, 0x7, 0x3, 0xfffffffffffffc01, 0x5, 0x6}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x104) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x8800) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x1, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x5b) 00:24:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) ioctl$RTC_AIE_OFF(r5, 0x7002) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:23 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:24 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x82) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, &(0x7f0000000540)='pids') mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x821, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:24 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:24 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000040)=0x1, 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:24 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) [ 849.724840][ T5296] option changes via remount are deprecated (pid=5291 comm=syz-executor.0) [ 849.789277][ T5303] option changes via remount are deprecated (pid=5291 comm=syz-executor.0) 00:24:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x0, 0x0, 0x100000000000000}) 00:24:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x15d, &(0x7f0000000400)="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"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:24 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:24 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:24 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x101) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r2, 0x80184151, &(0x7f0000000140)={0x0, &(0x7f0000000100)="0135c3914f6d06eed8ceff0a07c9b52460a1c36837e2b85fed712a42f885853fce3c757b1229e8444efbb5a6611d6134ad31d122dbdc6eff85bc", 0x3a}) fcntl$setlease(r1, 0x400, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4f3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040801}, 0x10) 00:24:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:25 executing program 1: socket$rds(0x15, 0x5, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:25 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r2, 0xc0044d01, &(0x7f0000000000)=0x4f) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:25 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x0, 0x0, 0x100000000000000}) 00:24:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r7, 0x400, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r7, 0x541c, &(0x7f00000000c0)={0x6, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000140)=0x4) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000000000022c48460b9d62a7ee61c3927f75cc0efe49fd23f6ac702c29773cc744696c5b7c93f64abde28cc09ce567667b213d5b6adf08facdc6bab14c4e8ce114d831ed9ce164c1e718ce34656a5afabe06710ba2d13e69a46bfb7a3ee69146bdc9407045bb8f3ca47a112575061be", @ANYRESOCT, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080)={0x9f97}, 0x4) 00:24:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:27 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:27 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000000)=0x8) 00:24:27 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x0, 0x0, 0x100000000000000}) 00:24:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:28 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:28 executing program 1: socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r4, 0x1, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x2000c804}, 0x40000) 00:24:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xfffffffffffffcea) 00:24:28 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 1: socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x2}) 00:24:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40101, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = memfd_create(&(0x7f0000000000), 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000180)='security\x00', &(0x7f00000001c0)='./file0/file0\x00', r5) openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)={0x100, 0x8}, 0x18) fcntl$getflags(r1, 0xb) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:28 executing program 4: socketpair$unix(0x1, 0xb, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000aafd19207af29c1b7d00c9e5c885baa0af06c3d9ab1a1f597b52006f56ab4737bc1d84a17d3f68ed4f28b7"], 0x2c}}, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmmsg(r5, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="69987f087d27fe4acce027de60891a8417ae1c0b4b1ba8de93dfd6f7a5be0e7419be9c4db17382cede234ad2ae880a6119b9fd080eaf5c60ac47d8489319a75223a9", 0x42}, {&(0x7f00000000c0)="2a0cf4812d4d057ada536c4d5582862a20c6a1a9283f20eea2828c46536f8422c7e18ef9ea0187f459547eee7f8c", 0x2e}, {&(0x7f0000000280)="5c8a7acf3e71dfd0576bc7c7c013c8fb10b5d887be3d0adb593550d18bc18107681cb817343a67f5c2b0cf6b12a0cdb53ba2f6d4b5f86d33db268271dd633406352982f739414ea23ca7eb56c47b6859b673da", 0x53}, {&(0x7f0000000300)="e6c4b0bdafa88b56260204540d55303d8adf95294396b86cd66322ba652ed62c57e95e2a3dea139711fe7cce5bd83440aaaa9f4cdb95e91c124b01b5fe05e47f983952cc2dcb452c3c1eebc07a33672586f733eb18ada501d4b996dbae576ecf8a119f6a4044bfe589f1bed58d02679c49124ce3e31599067a2864968d27", 0x7e}, {&(0x7f0000000380)="b51c1d5a2890c18ae714eb01b7e1e38016beb50ea5c102235952b4bd0414c90d0a8595784cf59a93cd76d3838a138449ceb221885cff164f95b8522aa88a1878da94760962160fb2fb0b9ca9d2e62ad552a167f30f7fe66a04fc4c2a071afe1ae55b467f1751964fc63943083e914e6893303ceb0338c38f4a066a1f2386128e584532be8b2467170e143c5030e1a0892dcdbbf3c95f993db2e47e22d6768712158e9481d5bff4fec55d4221b669ae7f6101150106c4d243a32f2548df5d1d7d6a94b93ecd3719d63dde9245c0b3511300735d0c98", 0xd5}, {&(0x7f0000000480)="1cf3797621ce9a8efc96a96b4637d889ce7f7dc4ab2d855243b0b1afa4a112b6ff251293304e4a5ab6d9337cd57cceb7331e35fb941dc4ced1f885b6da310ee88831e0cb2995426d9b9ad5632ab00c1dcc37e69494fcb9871c7f9e54149aa70e169c54f6cd5cc10d5330ccda86640dc6acf6659903f11e311f2cb8204718453abeef8cc9f6d8610428beeebc7695aa0730a5a5746a2808a09c72a29aef9b735e3055322d09c586a7bd121ebb776d9f17ecd480395e9565e3", 0xb8}, {&(0x7f0000000200)="fa7f9eec6227c4ecc30f6eeb", 0xc}], 0x7, &(0x7f00000005c0)=[{0xa8, 0x1, 0x0, "5610dd7cd5c65eff94758da939685417d7afd6e25a888486de6af8d979ccb11d8121acc0ba1280100249a0738cb0b8ba9d3f9a15c4be220698ef385ebc7101cea75e58792425d93f23b30e3cab89e5ab9bd7846fb16ded9bc33cb31133ce80ebc771f8f4f903b4c965f28f1ab9e91d3ae013b5fd219e2650fb076d2dd448ac14334f1b39a086b383092b85c6b3a7e53d036386cb27"}, {0x40, 0x0, 0x5, "575e6aa6d4593713e2748cde362b42838d38fcc6d34d3d87e0b008a22c4ea9f143abda5977c2ddcd94"}], 0xe8}}], 0x1, 0x0) 00:24:28 executing program 1: socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:28 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:24:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r3, 0x800, 0x0, 0x3, {0xb}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x7f}]}, 0x1c}}, 0x0) 00:24:29 executing program 0: socket$rds(0x15, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x40) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) fcntl$getflags(r2, 0x40a) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4c0100, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000040)=0xfffffffffffffdfb) 00:24:29 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:24:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x2}) 00:24:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r4 = socket$inet6(0xa, 0x0, 0x1) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', r7}) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0xb0000, 0x0) write$fb(r8, &(0x7f0000000180)="bdde805aa5a8c45dad8db3e85f43431255603e18abfcca98ccd2f36112bff12a5e2f751a", 0x24) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000bea2fa4200", @ANYRESOCT=r3, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e00000000000005edd00b346a60ae87c900e99c3dc8c8e37fb1ec66322dea423a93d7442e716e07b8a7aeff17b1d39aedaa9c144957e671c66ef35f967f564058165f48"], 0x2c}}, 0x0) 00:24:29 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:24:29 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000)=0x6, 0x4) 00:24:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x7, &(0x7f0000000400)={0x2}) 00:24:29 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:24:29 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000080)={0x9e0000, 0x190, 0x40, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a6b, 0x2, [], @p_u8=&(0x7f0000000000)=0xc5}}) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x2, 0xeb6, 0x7c}}, 0x28) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:24:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$HIDIOCAPPLICATION(r1, 0x4802, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:29 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:24:29 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:29 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:29 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) sendmmsg$nfc_llcp(r1, &(0x7f0000000a40)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x6, 0x2d, 0x4d, "3f9e3dc140efbf425c2d3b2d1b51c60470f3a6da8031113644dcafe49ae97c250e2a7f71836d03e64dc5a0d9242f0c94583b4358f0563552b2c7b1ae49365f", 0xc}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000080)="5864fbe4f8514076e7871e9fbe3551e21c640f9825f0b04f7cf6a2d65a300d621f4f994dd6689eeccd73a3c49fc0db4136751ed0bc9be80c82537dace72d66d5cfbc59e8af0275f15aa03778e5f07fe1ef02f533cfff51f13aaca2176b5462299cda24f95333e97ddf100461f4a6e585f718f1a677be6bcdbed04aaef9a429119410283ffd4508ec63713e38d59fe9e34a0127f1f6e7896f23c2fa65873b1903ff4786c799c2febbbfd7e59e29c40fa97693eceae00383e292a7af1314e96a29851deb810ac06bd0c66093", 0xcb}, {&(0x7f0000000180)="25523302de2c862ac5d3a859dc4c4d9cf3d262e34afb517295fabf78da300f897d59d5b004643ca0f3c9e25f1b16781b7ca24c92dee8544644074612796735f293798248e6d5b04b6684879580833cac7dc1b423721ecb0d9dce4d21b419515de8eaf25f7d9edbd97d9d38a56fd0dac300b68accefe065037af71cea00f990c3adb759c451ed2ddcb57ca7340d", 0x8d}, {&(0x7f0000000240)="19e53cfa3c09db8a7edead29d899b05b4d1cda8efaa25f5bd03c1bb6b14239f01706575ed267edf3f2f315c99d4a56028262f779c160abda36281f96a422daa43572b6ac01cbf2b54e7c2315a66a0e2aebaaaf3ddf34", 0x56}, {&(0x7f00000002c0)="b143d0441c81efa51498234af28fa4a13f2fb472655ca3dc37a8b08415", 0x1d}, {&(0x7f0000000300)="9050a5e6137773f3c9b54fc4b694375ee446830687b6d3807446cc2f2bfa107f6b7dae597e70bda6d35b9c3d147dc5f2a824a49d76e44576760ecac5379b94e481c9860138a99220cea69e9aacd9213f0c5f08c691b980892da64e0dee44d9381d3fd18eb8009f2289c3178f8a323415c1f528fba4238d8bb164d3024e6676eee9c054fb2c52cc8e061c54a8493f6e529c03c5d3cc1f923935494b9261f98cdafbd550ff32c9bdbd6d6c74dcd10bfe489eb0be7a510214314e7b752f8f02d500754792758478bcd7521e5062716220cc91c8560f8912598525", 0xd9}], 0x5, 0x0, 0x0, 0x20008040}, {&(0x7f0000000480)={0x27, 0x0, 0x1, 0x7, 0x4, 0x0, "47d0ef825b17133c028eddbbb360563dcbdc40ba9e1ea681a641e88ec2d0d780bccc93c9edf8cb3f42634d834280661d6748871e1700a8854fd4b8b25f4e6e", 0x1b}, 0x60, &(0x7f0000000680)=[{&(0x7f0000000500)="cfe454d085cb21d79ff5e7653b54142ead53eb10f14a5f61dad3f8961a019e417df8f73ac77bcc2b26fdf720103f73c09f2fd84443bc5694aa7d34fc39bb311fe645114e02295995a5f2da3183480f799d53ed59bc6a5d6f975a281d896a5190b2a7b0ccea12b7aa889c80431f8f551403cabc1a6a5595927dcd1c5f478c0547257430166f3d8f4d189c73c5d64050e02b3fc11fb1b4ba5b4a2255b2005fdd6d0c8d2e177f76968e39110ab3738a6b29da6dccfcfff0b6b6a3ee8729acc4b96e8be8abea09", 0xc5}, {&(0x7f0000000600)="923f33d3a6b0b860e8d20deacca83270ed9aca964dabf6b9ae7a86bd9b017f3a0baa0e10877fce72e894fe40b13a16c2b940d739c23914553c8516ac180f5bf6d196b550c96f064fb9999aa3953c605835833b6a6cc30be8af2299b740", 0x5d}], 0x2, &(0x7f00000006c0)={0xf0, 0x112, 0x80000001, "f9911dce229cbe8724b936163da3097b57eb792c47bbfe7265c33fb4ecb0e8af027bd4b151e2f815018f02cafa3c66aaaf36a8b59af9ac416af0b23c6bc75c7445ecbf4991a93fc4b2e3a0b52e8f1cb8bb0b81678e705b74ded2d62b9084bfb87cfda0b4a03898a260e21961890db112ae463546f7a5b233299b2b7af9a3f3508194d6d7c1c92ec58c7f5b28e8422b8ef38cb71835199f313d7546dd06fc4c7a93bb29230889e330c211e50e47b9ca9c74761776c291c35f6b670d370059f3cd6a532a086c5642c04136e885c1880973eb11341a50519c2f439b09ad"}, 0xf0, 0x4}, {&(0x7f00000007c0)={0x27, 0x0, 0x2, 0x4, 0x0, 0x7, "4a090b3d3a2088b4f472daf2c205b89c1b96f4fa39a31df75470e7722732aa38efd9735d50240fa44ad93834a89385727b0986a170bb178d360d44afe3eddb", 0x5}, 0x60, &(0x7f00000009c0)=[{&(0x7f0000000840)="82e8e9aa763242289f6be9b76aa2e9b384521278f9724b734d6689b663c82c8c93c417e77a92ad184d21f07ae62480a71cfd3607ba45780f8246a15e63810f03c3dc43db46e3b6abfb0a31", 0x4b}, {&(0x7f00000008c0)="5884da904918425397c020705ad3787da5a47862ea76f3753adcc7ac589ce9deca3311ee51a72ef86e84f8be996d29c3f0a1cd78f43c4f7fcf8a5ca36535bbe0e1adea1ba3b581c079c02a8f00bb43fd16569ece83b598d61836f8fdb33ce23ff3e6e50b3ab3e1301f16c0c818ca4e77294ab4345645ed7968ca4416e849300f33c3e5c387c1456ad73159ad3a11dde03169c523f83edfc3474acf45f40575d8145128f1ce42371aafdc62bc25ac25835041f5f4d17ca51b08cb34edcf5b473b4c6ea76b393d3fee0f3cbabd3a0c5328290d6cba68501b03eda35ec692d07161", 0xe0}], 0x2, &(0x7f0000000a00)={0x38, 0x10b, 0x2, "d3425cde3a82371ec8314321f027462afb3b5810c37af47618aea2a358fb97bb53"}, 0x38}], 0x3, 0x800) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000005c0)={0x5, 0x0, [{0x3000, 0xb1, &(0x7f0000000280)=""/177}, {0x6000, 0x7e, &(0x7f0000000140)=""/126}, {0x5000, 0x6f, &(0x7f0000000340)=""/111}, {0xd000, 0xe6, &(0x7f00000003c0)=""/230}, {0x4000, 0xe5, &(0x7f00000004c0)=""/229}]}) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="951d2304e35cb208c6000000b88a48ca6da2fa5f3319da4684046553f1090bd592e0375b3ef494a4cd3dc207e11d39ee78975fdd60e375eec7d95f3d713d1446595a3ea04a9632a4c86e933dd4fdf7fd1697477e7ae21021ff3f4b2612d05a86d3d3f5965bd9dad2113f44b24cee7ec905a19545cb815d27f41abe3ed16a47a3bc8b9e98a1655cca51131549a027ae99b5dd9615d4e584d74acf58264be36c4c058b0cbcaa58590519f9e427f0c6"], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:30 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x125) fcntl$getflags(r1, 0x401) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r2, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x0, 0x1a2, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x4}}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000040)=0x7fffffff, 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'dummy0\x00', 0x9}) 00:24:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:30 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000070000000b000000180001801400020076657468315f766c616e769df6b93a3e"], 0x2c}}, 0x0) 00:24:30 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 3: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:30 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:30 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 3: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:30 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xa00, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000001c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x40042) fcntl$dupfd(r2, 0x0, r3) setsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000080)="9a2f0f8dd5421a92523c56c286b0d667558a0b8c95e1715b4ef982d1e837f0676b5396683cd6368611e2c995e7be7c58b637e84812ea2be6cc9fcf9c0d2a0da369bda9dfdf2bbfe3fd1a85695b49225bbab786e47a7dfc8eca92133ffd40d3ea56ebe19f4e59a3904c9159474883fe8112e05e4f3f409e8fc2c6b32119e1d99f8520f97046f10cb79cdb8f94a499ad6435dfbc9644f48b37c6fb5460d9fd1bf4f9b99192c9fda2846b0aa826abfd060f3adf868c1d3403b5475151cabc956f4db11e0f0f15911dae6427ba1d32018d1808c7dfbc36f9383d11fd475ca364d2b647b572dac5abe2b5858e30d5115dff59a5c387cc18", 0xf5) 00:24:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$packet(0x11, 0x2, 0x300) r6 = memfd_create(&(0x7f0000000780)='\x83{\xa9\xb9\xa4\xc2\xdd*\b6\xe9\xd9\xdd}\xfcQ\xe6\x89t\x16:\x90p\xc0\xc2\xe0,\xb4\xac\xf9\x1d\x9e\xb6QR\xbb\x14\xf7\xdf\xf9y%\xe3\xd1\xcf\x1eTx\x13\xf61\xf2A\xbb', 0x5) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="78010000040a0101000000000000000000000008640004801400030074756e6c300000000000000000000000080002407b3d38b80800024073cb7905140003006873723000000000000000000000000008000140000000040800014000000002080001400009080002403ec4c65808000a40000000010c00048008070140000000011c0008800c00014000000000000000ff0c00024000000000000000074c0000800800014000000003080001400000000008000240215b3b0514000300697036746e6c30000000000000000000140003006d6163766c616e31000000000000000008000140000000020c00024000000000000000034c0008800c00014000000000000000010c00014000000000000000ff0c00024000000000000000060c0002400000000000000b860c00024000000000000000020c00014000000000000000092c00048008000240437fc262080002403e9eeee30800014000000003080002406e47a5a50800014000000001"], 0x178}, 0x1, 0x0, 0x0, 0x8980}, 0x20000040) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000680)={@fixed={[], 0x12}, 0x0, 0x1, 0x6}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c00000067715b77cf3492c8a8a1e25684b41b6329898f655b907afecd8c5838fef338787929963131e3d308307c0bfe492e7f7d7f1f15cb05a42ed80e0e8559a3296ef6", @ANYRES16=r4, @ANYBLOB="01000000000000000000ffffff0f000000000000020076657468315f768d616e000000000000"], 0x2c}}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000020000082044944eeb2aba000000012e0b38360054040008000000000000e3ff5f163ee340b7679500a34dbc930011fa9e15775027ecce66fd792bbf0e5bf5ffeff6d31c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c6540800"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@xdp={0x2c, 0x2, 0x0, 0x19}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private=0xa010102}, 0x0, 0x1, 0x0, 0x4}}, 0x80, 0x0}}], 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4008094}, 0x4000000) socket$inet_tcp(0x2, 0x1, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r8, 0x401) sendmsg$NFT_MSG_GETTABLE(r8, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 00:24:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:30 executing program 3: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:30 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:31 executing program 3: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4, @remote}, 0x34, 0x0}, 0x0) [ 856.502428][ T5561] QAT: Invalid ioctl 00:24:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000340)={0x74, 0x0, [0x7, 0x9, 0x5, 0x9]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b5e8e43180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r9, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) bind(r9, &(0x7f00000002c0)=@generic={0x5, "000001000000002cb18f6e2e2abaaf0adc47d1862bf9005404b0e0301a4ce875f2e3ff5f169d3340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010008000000000049000000000006ad8e5ecc326d3a090000000000000000002ef900000000006200"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x20, r6, 0x1, 0x70bd27, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0xffffffffffffff45, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x20}}, 0x0) 00:24:31 executing program 3: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) [ 856.588288][ T5561] QAT: Invalid ioctl 00:24:31 executing program 3: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xfc, @remote}, 0x34, 0x0}, 0x0) [ 856.796862][ T5577] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:31 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x3f00, @remote}, 0x34, 0x0}, 0x0) 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) listen(r3, 0x2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000a180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) r6 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r6, 0x401) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r9, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, &(0x7f0000000180)=0x10) r10 = dup3(r9, r8, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r11}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000040)={r11, 0x1000}, &(0x7f00000000c0)=0x8) 00:24:31 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x80fe, @remote}, 0x34, 0x0}, 0x0) 00:24:31 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x29, 0x3, 0x0, 0x0) 00:24:31 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xc0fe, @remote}, 0x34, 0x0}, 0x0) 00:24:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:31 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) read$eventfd(r0, &(0x7f00000000c0), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) r6 = memfd_create(&(0x7f0000000000), 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r8, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) fsconfig$FSCONFIG_SET_FD(r7, 0x5, &(0x7f0000000040)='ethtool\x00', 0x0, r8) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000b5f766c6182000000000000"], 0x2c}}, 0x0) 00:24:31 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xfc00, @remote}, 0x34, 0x0}, 0x0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x2, 0x0, 0x0) [ 857.511021][ T5622] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 00:24:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xfe80, @remote}, 0x34, 0x0}, 0x0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x5, 0x0, 0x0) 00:24:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x403, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r8 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r8, 0x400, 0x0) ioctl$FBIOPUT_CON2FBMAP(r8, 0x4610, &(0x7f0000000280)={0x11, 0x2}) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r3, 0x2, 0x0, 0xfffffffc, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0xffffffffffffff7b, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r7}]}]}, 0x5c}}, 0x0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x6, 0x0, 0x0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xfec0, @remote}, 0x34, 0x0}, 0x0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xff00, @remote}, 0x34, 0x0}, 0x0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x8, 0x0, 0x0) 00:24:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r8, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ppoll(&(0x7f0000000040)=[{r5, 0x120}, {r6, 0x80}, {r7, 0x1}, {r8, 0x2282}], 0x4, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={[0x2]}, 0x8) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0xf, 0x0}, 0x0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0xa, 0x0, 0x0) 00:24:32 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket(0xf, 0x1, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x24, r6, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r3, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x7ff]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x5, 0x9, 0xffffffff, 0x9, 0x0]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x20}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xd2, 0x7, 0x9]}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x33}}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:32 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x1b, 0x0}, 0x0) 00:24:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:32 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x1d, 0x0, 0x0) 00:24:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2002, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) 00:24:33 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x20000034, 0x0}, 0x0) 00:24:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x10) 00:24:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$PNPIPE_IFINDEX(r5, 0x113, 0x2, &(0x7f00000000c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r4, 0x1, 0x0, 0x4, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xfffffffffffffe74}}, 0x0) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x3f00) 00:24:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x4}, 0x0) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101102, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000040)={{0x6, 0x6}, 'port1\x00', 0x0, 0x10000, 0xfff, 0x3f, 0x9, 0x1000, 0x2, 0x0, 0x2, 0x9}) 00:24:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfc}, 0x0) 00:24:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$HIDIOCGRDESC(r2, 0x90044802, &(0x7f0000000280)={0xf53, "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"}) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB='t '], 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[], 0x2c}}, 0x20000004) 00:24:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x10000000) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x2, 0x7, 0x5, 0x1f, "b50219318df16621b58ec9a0c281d8cf60604210468ee1ccc625286fcadbd48112e23e4d16f670f1bea0bb1b9dc14bd7107dd79e7f86293c84f5315c6d21a5", 0x4}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)="2c577c97", 0x4}, {&(0x7f00000000c0)="026aeb7900a6b7b18ba65ee4f43e109c5fbe431ebbfaddeecac6783e0aa53087a4828677e1be91401cbd3a03e6a58ae39e11943c2df1bbd605131027740cb80436cb263ec90023e901c7efbb992f971833ae2bd7d0e22d0e8fe5720e00bec8e1516594dc32849cb7baaf9a7fdf94d3a33d80b781be0020c01c5a81db49c4e56441672eb46ec91490d519da4fef62a292e558dc87edab059927dc27ea0ad2d551775ddb201c113a258daaa6ee79ba21d7c2f19d3f1a25419c0a504236d70679e0c9cf81888e8639fd127671cb9fb379a00dc04cd54949b10186716a04", 0xdc}, {&(0x7f00000001c0)="0699a69b94514b3524212f6e0f9e2e907ebe8e24c5c74ee438e905913de48c7545a60c1a9594ac1b1611a6cdae3119994ed486714d7f2e98fe7dfa99f5caa41107235300a76a9af968bafb2642bf628b8117", 0x52}, {&(0x7f0000000240)="62357cd11abbde056e29de1521e98acd15a2d64a75df67a0c4f5f2f7d69a81067aacc43d41d38d24ba203bbb2414b61d3a700ea9b4f42dc1713d6287751cbf05aeb258a0a52ec071d03377a129e2c25d22164db1c219318a90f0b6a6a5359e9e6fafd71e7a6d723d830fdd75b8ebb369aa9409889b43d6da6834ffc501fc46c430ec05a39e6d2975467cfa5cc19eb5be34822d90492cd15592f80097f62d087d98f9b61aa10b32c21f19ad1cd87fa0b1efe824d65b635a58f24ced141621f933d70821a3e9b0eaf26875a4b4ead6669c9ca0392c29186889f3e7a6a7d398733b4a2376bbd9927e9c", 0xe8}, {&(0x7f0000000340)="aa9563673d14a55708c958cf1a07ade25f1e1ac3f1650a5515067c46fd523d3a29019ed9886c5866d83e3c61c217c77581c3d1812578dd20db77cd5cfe10f2d2f461c21382ac325e50e4a0b78262cabc9a7968337118175ed8702c", 0x5b}], 0x5, &(0x7f0000000440)}, 0x8081) 00:24:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x3f00}, 0x0) 00:24:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x48000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x3f000000) 00:24:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:33 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getcwd(&(0x7f0000000000)=""/197, 0xc5) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:33 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x80fe}, 0x0) 00:24:33 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x1000000000000000) 00:24:33 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xc0fe}, 0x0) 00:24:34 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r3, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_dccp_buf(r5, 0x21, 0xf, &(0x7f0000000280)=""/178, &(0x7f0000000200)=0xb2) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x2}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x170e}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x93}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x1000000}, @ETHTOOL_A_CHANNELS_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x6a}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x400}]}, 0x70}, 0x1, 0x0, 0x0, 0x40040}, 0x40000) 00:24:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x3f00000000000000) 00:24:34 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfc00}, 0x0) 00:24:34 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(0x0, 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x7, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={'nr', 0x0}, 0x7, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000000)) 00:24:34 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x40, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9d0000, 0x1000, 0x8001, r2, 0x0, &(0x7f0000000140)={0x9e0906, 0x400, [], @ptr}}) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x3, 0x0, 0x0) 00:24:34 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfe80}, 0x0) 00:24:34 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(0x0, 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) [ 860.039185][ T5781] RDS: rds_bind could not find a transport for ::ffff:100.1.1.1, load rds_tcp or rds_rdma? 00:24:34 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfec0}, 0x0) [ 860.149569][ T5785] RDS: rds_bind could not find a transport for ::ffff:100.1.1.1, load rds_tcp or rds_rdma? 00:24:34 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(0x0, 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x600100) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) bind$netrom(r2, &(0x7f0000000100)={{0x3, @bcast, 0x5}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}, 0x48) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="710000006f01000800020400000007000000000000000002000000020000000000000010040000000500000000000000000100000005000000000000004003010000050000000000000080020000000200000000000000c602000000070000000000000001020000000400000000000000"], 0x71) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0xfffffffffffffffe) 00:24:34 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xff00}, 0x0) 00:24:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:34 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x40000}, 0x0) 00:24:35 executing program 0: socket$rds(0x15, 0x5, 0x0) 00:24:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x3f000000}, 0x0) 00:24:35 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) dup2(r0, r6) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r7}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {r7, 0x8, "7f37a6", "51607c865d270f94fd1391955d7460fe7581670592b508dd5357a681113eefbb38a1cd5217580def4a3c1153969b3e310ba759ede82a598937b38cdbe3d66a17bfae4229ee9b4ea862f22189a733f76a3c28aeaa4cadf26d198d6b1dac4c28a9d4086143187083a6c1cc2041be2a05b33f21e2a7263de8aaae1deefd458b7c76577c222f8831002f8f031ef89626d659242b6ec10e1638311cc720d59a20b6dfdcea90790b970a356f2bdee86b43e80dc898918d7abd14f90a4fee22edf40c58f7c9226153463f8bb9e6ec0f1ee3e321066bf2b6647d08bdc050dc6cad2ecbc32f443a17837a10b30657d07f029c658b04ff400fc56706c11adedc9a5736bd98"}}, 0x110) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r8, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000000)) 00:24:35 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x2, @remote}, 0x10, 0x0}, 0x801) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xffffffffffffff9d) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r4, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0xf0, @media='eth\x00'}}}}, 0x68}}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) ioctl$RTC_WIE_OFF(r5, 0x7010) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022bbd7000fcd3df25010867321b42fc3f66410000004c0018800000017564700000000000000000000000000000000000000000000900ecb34c680000000000000000000000000000000100000000000000000000000063850000000bd6dc53706c55943ce2e2f8c63459ec4978f04451af87c3bdf32df064c391b5053eda2b3fdb6023a5841779e88f432f4d4b73f00001692f6e3d459ec2825ec7630f75210a2286a2568915eea796f021d62e61b306023351214121d538172292c8fccfb90d6ee2592cd378483c17180ee9b8"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4044010) 00:24:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfc000000}, 0x0) 00:24:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x346002, 0x141) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) 00:24:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x101081, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r3, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0xf0, @media='eth\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000800}, 0x240000c4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r4, 0x400, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x80000001, @private2, 0x8001}}, 0xfffffff7, 0x5, 0xfdd, 0x800, 0x2, 0x1, 0xfc}, 0x9c) 00:24:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfe800000}, 0x0) 00:24:35 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x2c}}, 0x20008000) 00:24:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfec00000}, 0x0) 00:24:35 executing program 0: socket$rds(0x15, 0x5, 0x0) socket$phonet(0x23, 0x2, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000240)={&(0x7f0000000280)={0xa, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0xfffffffffffffc2c, 0x0, 0x0, 0x4011}, 0xc801) r2 = socket$packet(0x11, 0x2, 0x300) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x200030, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x48}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x80000001}}, {@mode={'mode', 0x3d, 0x80000001}}], [{@subj_role={'subj_role', 0x3d, '/\x04$#*]h+'}}, {@fsname={'fsname', 0x3d, '{&'}}, {@measure='measure'}]}) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_DISCONNECT_CLAIM(r4, 0x8108551b, &(0x7f00000000c0)={0x7fffffff, 0x2, "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"}) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) sysfs$2(0x2, 0xff, &(0x7f0000000000)=""/178) 00:24:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:35 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) recvmsg$can_raw(r1, &(0x7f00000021c0)={&(0x7f0000001080), 0x80, &(0x7f0000002100)=[{&(0x7f0000001100)=""/4096, 0x1000}], 0x1, &(0x7f0000002140)=""/89, 0x59}, 0x40012120) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/4096, 0x1000) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x126) 00:24:36 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xff000000}, 0x0) 00:24:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000f40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}, @IFLA_IFALIASn={0x4}]}, 0x38}}, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x210401, 0xd685e24ef1094c82) sendmsg$SOCK_DESTROY(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xbc, 0x15, 0x10, 0x70bd28, 0x25dfdbff, {0x25}, [@INET_DIAG_REQ_BYTECODE={0xa6, 0x1, "503c9a52d1f8a0acc48a7a20d6ef640cc4e3155b27062e580c8855f4de977343ffc5c411cec9d414d202a9f00de6b30b52a11aaa3c3423bd40f2b3bde0e6d331d2a906dac86507fa5aa9ee1f85ffe570a4feafdeaed65141dce9b3ae2acc82134f102940a5884b87755c6d0c025d242ed813ece6a17808f106f80f8e15d138d33a25ac727862d86df6fef434ca0617e2481c7733f5377d5e6ce24306b930a414200f"}]}, 0xbc}, 0x1, 0x0, 0x0, 0x801}, 0x4000) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x3, 0x0, 0x0) 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xffffff7f}, 0x0) 00:24:36 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file1\x00', 0xc8000, 0x0) fcntl$getflags(r1, 0x401) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="600000000514200026490ff00abe0acb409999ebbd7000fcdbdf250800010000000000080003000100000008000100010000000800030004000600000000000000000008000300010000000800010000000000080003000300006ef87f837855"], 0x60}, 0x1, 0x0, 0x0, 0x4008015}, 0x15) 00:24:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) [ 861.742365][ T5885] A link change request failed with some changes committed already. Interface Y­4`Ò˜ may have been left with an inconsistent configuration, please check. 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x4000000000000}, 0x0) 00:24:36 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getgroups(0x1, &(0x7f00000000c0)=[r1]) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:36 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000080)=0x3ff, 0x8) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x24100, 0xaaad4662d9aa4238) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000040)={0x10000, 0x100000, 0x5, 0x1, 0x3ff}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x3f00000000000000}, 0x0) 00:24:36 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:36 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000000)={0x87a62ce9437ef138, @default, @netrom={'nr', 0x0}, 0x25b1, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x10, 0x0, [@default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfc00000000000000}, 0x0) 00:24:36 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x8001, 0x10, 0x1, r1}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xfc, r3, 0x501, 0x70bd2b, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x1}, {0xfffffffffffffe14, 0x16, 0x5}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xbe3}, {0x8, 0xb, 0x4}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x86a}, {0x6, 0x16, 0x924}, {0x5}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6, 0x16, 0x9}, {0x5}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0x6}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x44}, 0x800) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x20, 0x4) 00:24:36 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfe80000000000000}, 0x0) 00:24:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:36 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockname$unix(r1, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40021, 0x47) fcntl$getflags(r2, 0x401) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) 00:24:37 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x458100, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000080)={0x3, 0x1, @raw_data=[0x2, 0x81, 0x100, 0x400, 0x8, 0x800, 0x0, 0x7fff, 0xd13, 0x800, 0x400, 0x5, 0x1, 0x2, 0x5, 0x25]}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r2, 0x80044dfc, &(0x7f0000000000)) 00:24:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xfec0000000000000}, 0x0) 00:24:37 executing program 0: socket$rds(0x15, 0x5, 0x0) 00:24:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 3: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) 00:24:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xff00000000000000}, 0x0) 00:24:37 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, 0x0, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) statx(r4, &(0x7f0000000140)='./file0\x00', 0x4000, 0x400, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r7) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={r3, r5, r7}, 0xc) 00:24:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r4) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000040)=0x2) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') 00:24:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x1204802, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, '$),:'}}, {@measure='measure'}, {@fowner_gt={'fowner>', r5}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r6}}, {@uid_gt={'uid>', r8}}]}}) 00:24:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0xffffff7f00000000}, 0x0) 00:24:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x100, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 00:24:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000040)={@fixed={[], 0x11}, 0x10001}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r2 = open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000080)) 00:24:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x4}, 0x0) 00:24:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x3b) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) pidfd_getfd(r5, r3, 0x0) 00:24:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfc}, 0x0) 00:24:37 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x0, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x3f00}, 0x0) 00:24:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x1, 0x0, 0xfffffff8}, {0x8, 0x5e, 0x20, 0xa5}, {0x2, 0xcb, 0x0, 0x7}, {0x8, 0x7f, 0x9, 0xffff}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0x5, 0x0, 0x1}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8801}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x80fe}, 0x0) 00:24:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x0, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xc0fe}, 0x0) 00:24:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x0, 0x8000, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfc00}, 0x0) 00:24:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfe80}, 0x0) 00:24:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x5, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x117001, 0x6c) fcntl$getflags(r1, 0x401) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="95c40000000000000000010000000000000008410000004c0018000000f065746800"/98], 0x68}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) r7 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xcbc, 0xa0000) sendmsg$TIPC_CMD_SHOW_PORTS(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x1c, r3, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4845}, 0x200480c1) 00:24:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfec0}, 0x0) 00:24:38 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:38 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xff00}, 0x0) 00:24:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x40000}, 0x0) 00:24:39 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', r6, 0x29, 0x40, 0x8, 0x7, 0x66, @mcast2, @private1, 0x10, 0x80, 0x9, 0xf2}}) dup2(r3, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r7}}, 0x48) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r8, 0xc0205647, &(0x7f0000000080)={0x9b0000, 0x6, 0x0, r0, 0x0, &(0x7f0000000040)={0x990a93, 0x200, [], @value64=0xfffffffffffffffb}}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r7, r9}}, 0x18) 00:24:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) 00:24:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfc000000}, 0x0) 00:24:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfe800000}, 0x0) 00:24:39 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r9, @in={{0x2, 0x4e21, @multicast1}}, [0x0, 0xff, 0x4, 0x9, 0x8, 0x0, 0xc6, 0x1, 0x4, 0x8000, 0x7, 0x47, 0xd7, 0x20, 0x5]}, &(0x7f0000000300)=0x100) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:39 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfec00000}, 0x0) 00:24:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xff000000}, 0x0) 00:24:39 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0xa, 0x4, 0x2, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:39 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x81) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) ioctl$HIDIOCGREPORT(r5, 0x400c4807, &(0x7f0000000040)={0x1, 0xfffffcff, 0x81}) 00:24:39 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 00:24:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0) 00:24:40 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x56140, 0x21) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r4) keyctl$get_persistent(0x16, r3, r4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x0) 00:24:40 executing program 0: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfc00000000000000}, 0x0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfe80000000000000}, 0x0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:40 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xfec0000000000000}, 0x0) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(0x0, 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x0, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4618a40, 0xfa) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$HIDIOCAPPLICATION(r1, 0x4802, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_TX_RATES={0x5c, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x58, 0x3, [@NL80211_TXRATE_HT={0x13, 0x2, "f244386b2c8f2e78bc433459efc62c"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x9, 0x1, "465049a402"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0xa419, 0x0, 0x8, 0x623d, 0x8800, 0x100, 0x4]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_HANDLE_DFS={0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40054}, 0x40000) fcntl$setlease(r1, 0x400, 0x0) accept$nfc_llcp(r1, 0x0, &(0x7f0000000000)) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xff00000000000000}, 0x0) 00:24:41 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x0, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 00:24:41 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) bind$netrom(r2, &(0x7f00000000c0)={{0x3, @bcast, 0x4}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) sched_rr_get_interval(r1, &(0x7f0000000000)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000040)={'ip_vti0\x00', 0x1}) socketpair(0x6, 0x4, 0xfd8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r5, 0x10, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040010}, 0x10) 00:24:41 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x0, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:41 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 00:24:41 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x0, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 00:24:41 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:41 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0x0) 00:24:41 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) write$tun(r2, &(0x7f0000000040)={@val={0x0, 0x9200}, @void, @llc={@snap={0x55, 0x0, 'F', "69832d", 0x8100, "f072d2184d93ac564833cd4ed1fc99e971992941281adcbd3e916fb1a3c93bff8d8801809ccea5ec7b98316c5a536da2"}}}, 0x3c) rmdir(&(0x7f0000000100)='./file0\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x8) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0xffffffffffffffeb, 0x0}, 0x0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000080)={{0x3, 0x2, 0x9b, 0x1, 0x8}, 0x4, 0x44a5, 0x8}) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0) 00:24:42 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$vim2m_VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000000)) 00:24:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r6 = pidfd_getfd(r2, r5, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000}) r9 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r9, 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={r8, 0x80000, r9}) write$binfmt_elf32(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4608800640e00000000000000003000600020000000b02000038000000090200000900000001060007000000000006000000f7ffffffff010000070000004000000020000000160400000000010014a200"/851], 0x35a) r10 = socket$packet(0x11, 0x2, 0x300) r11 = memfd_create(&(0x7f0000000000), 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000140)={0x1ff, 0x2, 0x4, 0x1000, 0x3, {}, {0x3, 0x2, 0x8, 0x3a, 0x3, 0x40, "6bca2ac8"}, 0xf6b, 0xcaa787bc5cb47d3e, @fd=r6, 0x0, 0x0, r12}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:42 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0x80fe}, 0x0) 00:24:42 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2cee0d0cde6483ccdd1ad3667c11e60000", @ANYRES16=r3, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) 00:24:42 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xc0fe}, 0x0) 00:24:42 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@caif=@dbg, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0xfffffe8a) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0x0) 00:24:42 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 3: r0 = io_uring_setup(0x635e, &(0x7f0000000000)) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x8000000) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$TIOCSIG(r2, 0x40045436, 0x1f) syz_io_uring_complete(r1) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xe, 0x110, 0xffffffffffffffff, 0x10000000) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) prctl$PR_GET_KEEPCAPS(0x7) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r7 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r7, 0x400, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="08002d00e9f0cb7932a06df9afb13f130bcd49fb7a25564567c331ec2e9519d465995322409e966a31e33d114ead0312a1"], 0x35) ioctl$KVM_SET_XCRS(r7, 0x4188aea7, &(0x7f0000000240)={0x2, 0x2, [{0x0, 0x0, 0xf89}, {0x5c9, 0x0, 0x7}]}) syz_io_uring_submit(r1, r3, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@pptp, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/240, 0xf0}], 0x1}, 0x0, 0x2020, 0x1, {0x0, r6}}, 0xff) r8 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r8, 0x114, 0x3, 0x0, 0x0) 00:24:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = open(&(0x7f0000000480)='./file0\x00', 0xc0200, 0x0) fcntl$getflags(r3, 0x401) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x2c, r5, 0x5, 0x70bd28, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}]}, 0x2c}}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x3c, r7, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="95c40000000000000000010000000000000008410000004c0018000000f06574680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000ee91bb1704baf7326d1df817ed4836427665cde92013744e5c93f56ff7e2b07bcc26355b831766e077449229f878d5d6bd"], 0x68}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r8, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x2c, r10, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x10040010) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r7, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4802}, 0xc0) accept4$bt_l2cap(r2, &(0x7f0000000200)={0x1f, 0x0, @none}, &(0x7f0000000300)=0xe, 0x80000) 00:24:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:42 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfe80}, 0x0) 00:24:42 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfec0}, 0x0) 00:24:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000000c0)=[0x0]}) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) bind(r4, &(0x7f0000000280)=@ax25={{0x3, @bcast}, [@bcast, @null, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000040)=[0x80, 0x4, 0x80000000, 0x8, 0x4], 0x5, 0x800, r3, r1}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c000000d4074e7d90cc191fe22edc0208efccfdca38ad21184d4ccda0daa9647060b3584c72670174d5753ed1f4384c7b786c844262ea40fd5433cd68117efc46ee54d3a05136f687d82e6a01d7e6c648a363248b9a23c518cc498e88dd545f8bc093cad7cf84162c3cf5d07327d4298cfc8831da1c0b28d1260407200ec568af98728a1933b1778d55ae0abf3f4b0099ed65720c6a83dc0ccb76debebc005f5e598ef8c7861fa963dc1dd0a2", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2501000000080003000500000008000300030000000800030002000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc441}, 0x4048010) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000b000200180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_MPATH(r6, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x50, r8, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="ae2b3b12ce92"}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x14000085) 00:24:43 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xff00}, 0x0) 00:24:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/191) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) 00:24:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2800, 0x0) ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f00000000c0)) 00:24:43 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) 00:24:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x170}}, 0x0) 00:24:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x0, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:43 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfc000000}, 0x0) 00:24:43 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r5, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x120, r5, 0x408, 0x70bd27, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x120}, 0x1, 0x0, 0x0, 0x41}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x103040, 0x0) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfe800000}, 0x0) 00:24:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x0, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x200002, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5d9ee050ff49cc3e40487ff33d4848a912c24bc42b5404177232b335595d8dc29fc8f08e8ec137c6a4934464a00b2f9e86a37a09aa1dca13b64d5090a85bfba93e51db743bc2c19b28a020bf3b015252ed4ac5f8e29e97493deae00707571a4b1b695e2ef126d58ef4eae78e0774fb406c6e62a757a76b2a70bf255bd994a08a2428bd7e3cfa6801f54192ad69d7eed34ca4495145d3bc1bb53b2aea1706bf0b8a805880325c4e37128c66682000b04764cf0b4e8c5aba6b622e103ee29075895729ff104581a662d5bd2a926bfa147e9d4463f9013d3603c759d1ba63194a", @ANYRES16=r3, @ANYBLOB="000028bd7000fedbdf250a00000006002800040000000800340049ab000008003b00010000000a000900bbbbbbbbbbbb00000500380001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4008005}, 0x40000c0) fcntl$getflags(r1, 0x401) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000480)="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") write$P9_RSYMLINK(r1, &(0x7f0000000240)={0x14, 0x11, 0x2, {0x0, 0x1, 0x4}}, 0x14) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xfec00000}, 0x0) 00:24:44 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x0, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8200, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0, 0xfffffffffffffc96}}], 0x2, 0x4000825) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r5, 0x4, 0x1, 0x9, 0xfff, 0x30, @private1={0xfc, 0x1, [], 0x1}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10, 0x40, 0x7f, 0x80000001}}) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r6, 0x114, 0x3, 0x0, 0x0) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xff000000}, 0x0) 00:24:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:44 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x4, 0x21, 0x0, 0x5}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 00:24:44 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x4, 0x21, 0x0, 0x5}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x4) 00:24:44 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = dup(r0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:24:44 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x4, 0x21, 0x0, 0x5}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:44 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfc) 00:24:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:44 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0xe0, 0x10, 0x25f32caec8b44649, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="76a638dc0ffdacad096f8e5bd231646e1deeef2b5a4fc32e1790d016bce9f48c1324336761b070920636092c5c176a268d19e3c14387c45436", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, @generic="b96f78f6a7eea8424beef26010f71c6624130e762d227476e12fa1911933573696ab7db927a497484774fb6d03f6a8510e7da7e9f3406b39d4e4ec2fd65a55c4974246dce5c23edd54bf67983073474246ea8b4ab4b042a961c0a8a05a954543c5ac39eb776646cb5b6b1b4e7716dddb6b7141abfd00000000"]}, 0xe0}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000240)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="824f96e15d03c930e05ea62517aae38a2ca823830d0318d3bc4a317e2016aef4f5d64f4bbfdd5e0e2427ea8e2c283f7e5842bea2e0b473faed631b30136e08852691cc13b9f1d60d12ac88369485b8e616b8de11cd59e72b416b783a0e7f37b09622bd89fc43818496a150c1513affd931fa6b2e86cbe1c8d50913e4c0df233630999f419d09739b71b2573b19", @ANYRES16=r3, @ANYBLOB="080026bd7000fcdbdf250300000008000700ac1e010114000600fe800000000000000000000000000026080008006401010208000c00f572a1a508000800ac1e010114000600fe8000000000000000000000000000bb0c0001002826292e5c7b5d00080007007f000001080001007d257d00080008000a010100"], 0x80}, 0x1, 0x0, 0x0, 0x4000814}, 0x8d0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x7c, r3, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2b}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x26}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x25}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) 00:24:44 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4080c1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = dup2(r1, r0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xfffd, 0x1, 0x2, 0x7f}, {0x800, 0x3, 0x6, 0xfffffffe}, {0x20, 0x3, 0x1, 0x8}]}) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x3f00) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x0]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x80fe) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x0]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xc0fe) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x0]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfc00) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfe80) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfec0) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xff00) 00:24:45 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x0, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:45 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$CHAR_RAW_DISCARD(r2, 0x1277, &(0x7f0000000040)=0x2) flock(r0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)={0x48, r4, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_TID={0xc}, @GTPA_FLOW={0x8}, @GTPA_LINK={0x8}]}, 0x48}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9525f41300000000df250100000008000500ac1414aa08000100", @ANYRES32=r7, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000141}, 0x4) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x0, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x40000) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x3f000000) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x0, 0x6, "cc04e1b0"}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfc000000) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfe800000) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfec00000) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:46 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xff000000) 00:24:46 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:46 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r3, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x208, r3, 0x900, 0x70bd2b, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0xbd2a}, {0xc, 0x90, 0xfffffffffffffffe}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x6}, {0xc, 0x90, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0xfffffffffffffff9}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x401}, {0xc, 0x90, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x1f}, {0xc, 0x90, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x401}, {0xc, 0x90, 0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x4}, {0xc, 0x90, 0x9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0xf052}, {0xc, 0x90, 0x800}}]}, 0x208}, 0x1, 0x0, 0x0, 0x4810}, 0x44) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x3, 0x0, 0x0) 00:24:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xffffff7f) 00:24:47 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r2, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}, 0x1, 0x6c}, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) sendmsg$AUDIT_TTY_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x3f8, 0x4, 0x70bd2c, 0x25dfdbfd, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4014}, 0x8001) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r2, 0x10, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x76fb, 0x3ff, 0x8ab, 0xffff8000, 0x7ff]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, 0x0, 0x0) 00:24:47 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x34, 0xc, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000000}, 0x40000) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:47 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0xffffffffffffff25) 00:24:47 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r9, @in={{0x2, 0x4e21, @multicast1}}, [0x0, 0xff, 0x4, 0x9, 0x8, 0x0, 0xc6, 0x1, 0x4, 0x8000, 0x7, 0x47, 0xd7, 0x20, 0x5]}, &(0x7f0000000300)=0x100) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x4000000000000) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@get={0x1, &(0x7f0000000040)=""/236, 0x6}) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x3f00000000000000) 00:24:47 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) read(r2, &(0x7f0000001640)=""/4086, 0xff6) fcntl$getflags(r1, 0x401) r3 = socket$packet(0x11, 0x2, 0x300) r4 = memfd_create(&(0x7f0000000000), 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000001040)={0xaa, 0x33}) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="99f9fe6ae1168371967e7befd6f158cace597ea06e2ebac4670e9b78ba1c1a876fb93f3d2352dd906a3b99cf828c96857ca682f20c42ada510ee4da40a567b2be0eee631a14888e5e4be86a7372643034cfe677114933ecef9d6b267bb819161033e3ca8e969f3757bb07fcd4561b6e1bcdeef853e2857dcf4cf6b029d395a2a57dd2156020d58796d0cae25", @ANYRES16=r1, @ANYBLOB="010000000000000000001b00000008009a001b000000"], 0x1c}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r2, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r1, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x345f, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'dummy0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x70}, 0x1, 0x0, 0x0, 0x20800}, 0x10) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, 0x0, 0x0) 00:24:47 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r9, @in={{0x2, 0x4e21, @multicast1}}, [0x0, 0xff, 0x4, 0x9, 0x8, 0x0, 0xc6, 0x1, 0x4, 0x8000, 0x7, 0x47, 0xd7, 0x20, 0x5]}, &(0x7f0000000300)=0x100) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfc00000000000000) 00:24:47 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r9, @in={{0x2, 0x4e21, @multicast1}}, [0x0, 0xff, 0x4, 0x9, 0x8, 0x0, 0xc6, 0x1, 0x4, 0x8000, 0x7, 0x47, 0xd7, 0x20, 0x5]}, &(0x7f0000000300)=0x100) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfe80000000000000) 00:24:47 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xfec0000000000000) 00:24:47 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:47 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000200)={r9, @in={{0x2, 0x4e21, @multicast1}}, [0x0, 0xff, 0x4, 0x9, 0x8, 0x0, 0xc6, 0x1, 0x4, 0x8000, 0x7, 0x47, 0xd7, 0x20, 0x5]}, &(0x7f0000000300)=0x100) 00:24:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x1) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$inet(r4, 0x0, &(0x7f00000000c0), 0x800) 00:24:48 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xff00000000000000) 00:24:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:48 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) 00:24:48 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x40, r3, 0x1, 0x0, 0x0, {0x2f}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x6}}]}, 0x40}}, 0x20000001) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x20000, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000002c0)={0x10, 0x0, 0x5}, 0x10) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@private0, @in6}}, {{@in6=@dev}}}, &(0x7f0000000040)=0xe8) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="94010000", @ANYRES16=r3, @ANYBLOB="000429bd7000fddbdf250b000000080001007063690011000200303030303a30303a31302e300000000008000b00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0001000000080001007063690011000200303030303a30303a31302e300000000008000b00000100000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0004000000080001007063690011000200303030303a30303a31302e300000000008000b0001f8ffff080001007063690011000200303030303a30303a31302e300000000008000b00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00070000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b000900000005ca4b0b7924e8c368fcd63290400a5f3f83de37f753cd858c4a9817f9eb7d9e4e9d7161218296518262819c044316290882f8c62ceb2f70a7965cfce02528f6ea21171c56b7ceadcca96e4462381a591e6d2b7269e2ff966f64dcd2c13511e7130512fbe9f5b4de3ed453cd5b5efc85a99d989e1c587e3110b129128c56f835771f"], 0x194}, 0x1, 0x0, 0x0, 0x80}, 0x20008000) 00:24:48 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0xffffff7f00000000) 00:24:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:48 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000000)=""/17) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:48 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r7 = dup3(r6, r5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x17) 00:24:48 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:24:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:48 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000001400)='/dev/bsg\x00', 0x18020, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000540)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000480)) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f0000000040)=""/59, 0x3b}, {&(0x7f0000000140)=""/168, 0xa8}, {&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000300)=""/255, 0xff}], 0x5, 0x6, 0x1000) 00:24:48 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = semget(0x3, 0x7, 0x400) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f0000000000)=""/31) 00:24:48 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) dup3(r6, r5, 0x0) 00:24:48 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:48 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r6, 0x4, 0x2, 0x8}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:49 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x202400, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r1, 0x80045017, &(0x7f0000000140)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10080, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:24:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) 00:24:49 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r7, r6) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r8, 0x4}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r4}) ioctl$sock_inet_SIOCGARP(r9, 0x8954, &(0x7f0000000080)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @local}, 0x44, {0x2, 0x4e21, @remote}, 'ip_vti0\x00'}) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x40001) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:49 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000016c0)='.\x00', &(0x7f0000001c00)='trusted.overlay.nlink\x00', &(0x7f0000001c40)={'L-', 0x7}, 0x16, 0x1) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000258f88)) msgrcv(r2, &(0x7f0000000100)={0x0, ""/110}, 0x76, 0x2, 0x2000) sendmmsg$sock(r1, &(0x7f0000001b80)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="95a7064bceba53a40bc914ff618b57d8ccf5b6a35a8ad9175262ba950ec7e999a1aa7cc0850371426df2911fa1c26e", 0x2f}, {&(0x7f00000000c0)="fddceddc96dc7434dd7eac48d1f96d379a803d5ea1", 0x15}, {&(0x7f0000001e40)="daae67d80920ce59a930aa397941b0cead06b9e9e55615283ea9eb5213a9346b35ce7145d5b3d2ab319e307a807a4d06955312b74b9a3bcbaf912112d32008621db3daff9e28cd37d12701340eec74619a31110292cfec4afe643321fab6a6d272a368ef4808d19298940ab388bbe24030ae3bb0612e6adc095d9b1d73bb1a5639ddef25f6601471c9d66eefd10b78499f1645cc81f38349f57175fc29f7b3be67488913397947df6343c93c81f5188c1c6d484b376ffb4f937220c99f108a0bc3d19d18bf14a3ac7ba1c8406ddac5837ba2627cde7213b45aa62bf696e324cf49306fd125", 0xe5}, {&(0x7f0000000200)="1214eb45944294cef8a6712024d31d0401abfaa440c305d384b6c8f8d4dc3ca2bd60ad5952149c7afde93fb6ed74e098dada32801108645c2fa153859cf7", 0x3e}, {&(0x7f0000001c80)="111195777acef7fb0ee21e1834b15ce45113eab97b4234a648faa77757873669b94225f02fb5684f44bc3a0493a66ab0cc1b5dbf5e06122baca16ad1ce0804a3118d5438a28a7a67", 0x48}], 0x5, &(0x7f0000000300)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x6c6df45}}], 0x60}}, {{&(0x7f0000000180)=@ethernet={0x6, @multicast}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000400)="e438fed2c9582e7f779a4789aaa47e9bf401c58e93bfc5be0eb4d04c0de031fdef6492feb751657149a8c35ed1d6a7b068dff7621f2cb7f13e589898716ba1b8408a0fb87d105c60b707c0", 0x4b}, {&(0x7f0000000480)="1b51975d8fcc444c73bcdb689231e131999671c7e36df5ac8f622967f5b2239325187c626f4bf86faa0106436aab17e36e149f007d50f7276a8443ee8b1a01fd5edeb0795f75978fba6a973b34640b98636b1ef13d683c1f3ea29643c31583d7e56d5f179dd0516cc44aae38d12daac72db020b35291cca1e58f21b7a617e44363158f17b61d6827e18556d1150b4849b471be930d2287e18f8fcceef224e2a4304c5f96243de31f98576ba7bd58495db47780311ada18875a3f3d74be48c8469197689812fd70f12666519f9b7c989618e0362613c72162ab10bd72e8f147c387036f93cc8246c023f70adeb377e68db9e7e0161aa7c34d9793fb9bf3b50c2d85f8f21e7a35aedd24cd2a8e76afffcf0265f1ada25b4e38cfbdb24dde8f5bd8e557feb951f6a66ef36fc56d30323419abb134e9aaba83676af9957964344a276e7ad7719d96100ccb1600e4b7cc88dcc3e15953dcdb540aa36fc53d672afbeebd33b44f600f8d758c7db4ab2e09aac56bb4650689bdf42589c84b5a33766e6dcd0135d77b4a65a8dd884c8164006af8dfdd1379576d0adc07795f3004951c50ad10a060e792bf7ffb12cddd00879c5d7228476e79425518d1f53bbdbba811c59fe91dc82bc252700f90a8f7b6e339f8fbfae7acf619109c9ec7d1236da3803ba8a5346fc99e4288eff0178f42e3ed27ee4fb666a13848f2fa2c84e7a796de587897f004e407c637dc7a313190193e41786a30f0f0448ddd5d9c67721720547e6bf767b63c351b14f7de728299eb708dd5d4bb90b809470be03d1888cb0208dbca14902c4cc9e73b59a8522d12d59fece0ae05e72a1ba76c6c821ec0137b57a42d5a3fe8202128c7c67ed7576f485c94852ffa98bc56bb1dd7b6e4a95e529ccfdee816d451812c9f278f0cb6054a5adc826d02b3277372d02d2076d89c66fec8d6905773eeeefcc5479eb594950f2e80bbcc01ddc824b2fe22915591f3835e81cad23fe43ecaae19627f2e0dea656f3f75c09c7059f86338ff30474f0e9b279c0e8b129eca5e40f121f499e62eb6ed34ac67394191517fd118bbdf09b424881e734ee5daa48558e14966d44240f0f392d0f8c80bdefd8f20771aeeef7a595fd0d8e00343ed6136b344af3b02eeafb76d5fa11d7a7e5d97c724b5515a74e1aff79145678813fec96b03ea1ccb00b28fc2c3aa2baad410177ece544346e31e0225e4d2cc801cd8f9cb3997109470134b59091f08e1446e5af88578cbb6e7cb2141eb83e94b8e62c4af8c9d2315dc926c488012d2c08fd5e99698bc0970ea5072c85759dea04a377f3de72d052da52542c1aa2fe3334f42f89f340cdc1dbf90feecb3701c62ed56993e7bd63c849a9d49ca3530d8c9a233f037e2adda618358d33d41ab9717babfa041c04bb2ac4f7993077a2104690bd53b476b81259d7c4b079b444cc720d451d07ae4e599df905082fb46bbbc5e1df99d29d685238fea52b5937beec0f4cd316d9eb01f11a4d3b3515bcac08df95cfefed57b15d2a9a66eea60139310e619c0e687b73b44933d62099e4648ab08c15cf1c49788d2c361de0a0759b3ae10b29a48f4f8ff85d45f225f7a9015c2bdc5aab65668a10928b5c592b65070d545175f8351d6f7fb65a15758f616a714a154d66ea5eca426ee17e46e365d113f1e8a7710423febea1b46893c52765c4108bbf1a3ecbf05ed18a9fcc9701ce9180354770abf1e0c644c651b25831bae09d8b8a87371f55f809ad7376c27b34c042a4aced217c7ef64e0abdd3555aa435ebe8a2d8fcd6137234f134e416a97d194f257089a82e62015baadabccc367462a9044864ff20c39768c63efd14dcd86a0fb29cb1300a904920ef55a922b53185e19ec31696ccff86f1f40fb5060e6dc5e57589cef1fc914fc015f93a397c74cd5a2379992fe429745f8b8c6807dec2c23508d193d3a2a6cca12b35471daff22be8d0d41babf0ee6efff2dbff2385b9358b01ffc5efa06a3a3f8d76d32f1576eeb54a3af26a70628517047514eea3b7d3027a01e41718f096f26a1a6a731e189bb132fa2f5df978331cd3948af212443dd5de1b5bddd83cf9a5e2cf455d28f25cb5c72ae6f8f38eac24b17865d110604f9973b7d57000e18745c2d4480ec3a850d940033656bd3d15f4e301ea58daf89e3a9f60a6a77fb6765c874550fec9a7b04e33550a8cf8fc23dd44bab97803484a917e6dec5cbc949be1029acba077da64f422f1903f6ae84661667c997d3d6ea3019d98d7329b782a5bf99d303cb81ea456a2c94e45ba1efb2784c672fe8e38f6da9f3081476e4db77d6483bc1c738a98b404a2b4314bf4efbb46469e8edc8c0178cbe7ae06bdf1f8bc3b37f1bbdf8e98db5ae1dd1d90fd84c4a66c2cd4584675504148936dee24bbc8fd350ef9532e786f18391e2d9fa61ccd105abae01e48f996ead7796eedf1c5791f099c33f37e701a208980c257e8df75023beaaa642646ae2bcf5004586335064a2707d74b91aa64e6daa2344a434078b419b7addfd79a4980b1075a457beeca6d86d701ceaf0929f9a9af62a7de9800ec43dc52cd6b27f595b3f10c6dbf30ea3f0702eb32e3d5d62bf5a4fbb2a4ae4964795d36d5382d199100131cbe5126412f39c1f421635a9ba46695bd561dbd1b80dda3e9b9c16dd9d73c717ca7bb7a95f23192a962e0e20b13043fb20b05a68dac61a888f4ed8a4b40b5d2bec19525cf10ef6943b0527da03be27e7b0644f3fcbbf03df019a5740e5529e3d9bee0cd9acde0959959259098d9ea68879762844755554cedbc15537140bc0cc0c45c47480257786ae24a31da6b06837a4d5ce1c8451e2d11fd29098219e669212c82285cfbd55af02152eb80d92e39d076ed7a497b6f15ab9f2e941466cae1cb24d145ba832e9cc5b66b98cd33a01f00c27898c26ee878e9560c74e7455577779f91747ac031a105451a10ff208cacf48b19e3f262a4e8134b827d499df175b5ed39fa711dac7820df26016d1cd756d059c456094309929ceccfadfa0c4b1e0563cc6a3450e1dc7d816a1f912ee1b97a68db98cf40bbb995e1bd725078ff60ec56a6e6b9186802105369d1ad3ce0f54d9707f68c3bba6ca6b263540b39031519f32090ed89fc2cf60ecdfc26d7a36f9df8aa08426130df23d25ff03fd95b21c6c54edfe8cb0171b06854c9581404ed58b5b4179d8e90d644f6e3b30dc2191d417c46192cf046da0ca085f45473f703fa2ea156dec928b9b34696a32cd97c8c27f532a6677e8a5868ca078dbc4d74e87161419e56054e1eab1ebff283a4bd1f0cf297e1b7cbfb2c7c67d6269560c617df607f1676a6baec153b9bc84cce70910567b0103e296a8c23a4f5e764243035cff93da2be9ad55a5808697f822e2421ac5c388eb3901a0b614bf5f9a793abbdb5d3fbdd56883d3499d8b96fb5452fee2739a9c5d7c65396fc79c7839e561dfb1390f4e05b32659ee748707372bd5ffda39ebd5925c60dae9e0a1d0f0871ceb07b27a03c21cb2dd5e6b77ca7d3535910175963400a83f3ea4204c45b1344191d2ccc6bcc7c4a638a769df2901a1df6b3beeddb73288cf7e496a76493eee0308413866032d51d3e36e3a21494597e67d0b2daec4c24bf6ec202e8d73f8d0741f4238a8979fbccbb68148e1d88de685a35bcddb88990bd7da8f0f5509a6d8a38376c59e46036c5f90d29a56158308bc9f7345188dc125c01bb0d68172c916b084117e2e1f99b9d3f161b42490a4e2f15fb5a914ee835dd27ab10c39136a3323d24f414e4fafdac1903617db0dd4efd1b234d4758669d88393289b3e9b88031f22469311dac288cbe76e27ef701119fdbc3d85d8b65fdf7ba967e1d59ed804a14304767e4c69c2f68aa9b6db8070b538fd4243791e49d0397ab6740d71dc6c50cc378e2f22280b64d99dbff8714c412a4f563c3b324e4d44c83edd07fafdcfb03345ac6e467bee2f99ea70a0b7fccf2055a7734275dbcd14a2445b1ae3b7bfcde05c96ce33ead658e82a452d91718d83918b9725a6244fd3e7bd0694775acd355b2fb70e556183193c2afe4a85e5c769779a3a27301508daff5adafa9b5dc278fc415e5b857a54b05b4f1a41b44061df720464a89597825f5a7d012dff557c317976cac3f94fd73fbd2b9d0b624eb60513a179c069cc6e8d8856b3794564e1514fa83cc6ddf1d58644e6e157c2676f0d2f78c29515bc58308d21bd8665b3541c59bcd05f039f0d352029ee78cec0bb47bb08c8ff6a856b63ac9e691576faab70135a81004e87cca38317410a08c62f6a333fd22a8d9f8e45d3a039373257ae20dc89658b40e675a7323dc5e43f25d3cf8b6d318100a2dcc8187a8b40913e19ba2708227604918eab720ebb259718ed51cf55f2cacfdb2a14fc09768bdfc5b21e555e5254ec6acb887a519d3095183a39714a0d6e41dd300162a7a1478874e9d0aaaf003e5482e9eb49397c243f324340842af0221ed17040d18adc8e3985b48021aaacfb48516338e0a25fdabbe6db208d4652525d0427b2cecc81a6b23af1397cd93fbfc4d62bff5f22acc9fc4e2180c494c1c98802b1f0361b675420d917f41eaea6e12ece90499142454e2b47a5b4d202d0bfe2617287e62c6301e301e48d97fc5718ae4447fc99c37976e965cc5da5e8d0086a260a5fcc1e55dc920ce552b0c651aced156a75b3fa8fa9494c546b5e61611ceb20611e0f141264bd43c617d402ec7debc3986672cf550cb0477716fd6b8140c0d4cb0861e71b2c020369b9885d8515f3da4003b1bc01e8d720ef0275929985a23aaf93c65859982e65c96d7e1eb953ea2f0dcaebd247584458953e781ef1751922978c30a4545fdbff00239c1bf9230cf429596b17b86effc708450bb8cf531f98244af6e736d734881c374f4455a7b3e01e63dccd16068b7aa468d3b70170d5ccb02b5a391c4827bfc71dc222f04744dcb30d3f515d1b9482b98af982563b79b02deac7936f45a4a7791e2b9cc6ca0fbaa02fb38338c5509907f82f11bdc0e41dd1cf524d3cbfdbcab61b06e2afadf940ad4f46ad751844021914ca725c67684646f7977181f55d9d69ae272ec065bcf8558248fd8ce024798b81209c02560357264504dbe4cc075bb78a717e6ccfc78c784e1fa3f223f2326e9cf95a8813b4811f13a4eaf434408540cb8bda1dda6b17e2e2d08c3d98bd023454dbafa0baf5c6f726447713d9975d12bd469a95f607a8cd0a9aeccaeb78c850cf798fe5c8ff37092663e1a29733b1e65ea35e0cbcbdea209f9c9418ccf06ec28d815cb39685e4e2810a7d159f7b744a4f18d4f556f2bfb8f965d65e5c7b6bff4b48b2440e18b41d85971cdf97a14802da34a67e9f8cdce90e8c276d2a2b80c706657def23cf366c6ffc3429eb0041d283d26fd08297101d30f2ff17390dfc4b7bb0c7ab37b0ab30e36bae0196f25cf737c271548a35f890d73addbfac3d02523bb0f8eea3c62e7f3bafabff6fe20906237e77b4b19a4a53c0087e51ce31d3b95d734287d7f6d2ec446c75808530d8841f634b0676281ef7d30e33943d8094f09e2cedf709fbcc36f1f6e2f0fadc84190957c72d8b7d8e2d69f59a84c4200f740f28c8db55cbd2b02ef1b618ccefe282d92dffa4d8a33f3abae365ca7ab723b35bf03de3aff76c7ee6f7f52c4632b9dc41ac3ab09dc692afce5452d659f710b3c26d0a4a0f788a4be99eb936395c7c8e9b6641d65103420e889d4f8ade5fa98d0e9304f99e37b127e0f6c3fea1b348b7174bba25a304ed99483c133b", 0x1000}, {&(0x7f0000001d00)="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", 0x124}, {&(0x7f0000001540)="52dea5d7990afff8ee3f360e184ec6d94f4e73348dea48670eb7f14cf4a664beb9f445672b6eb60acdfa5d020051b74594e6d568a5af02ad4c082b4c09d5880c69716a40e7be8f4507316da0c1b7885851c3740e90ee1075d63874fe51aa87e66ea4c651b2b62aaff4c27b2f29d2650741a04ec86cc3a9f81f62bfe3af27a431ea518c14606bde1a861b9838b939aa24726f7fd8d44ee41bbd87fbc89a9134c9d65b67e9d37191dc6cd3a504becfa9eb9c0ca5247f4b29e464a087eb59a02c48878ce1", 0xc3}, {&(0x7f0000001640)="218081afc0e64ae8674d47506b043c66f52d25f310bc9119e2818cfe29eff2a51e7b8a85b15a0ab87b3563dbb097a8985fd9350c28156c8e75ce888c4651690ae3837de2c73a2d3b77519661123a14199ff0961b2c2d17131bfdcb4531632f696e6270657f1ed871349128ae8ec92b4c7d2b1af6c23958cb236773859ded3494", 0x80}, {&(0x7f00000016c0)}, {&(0x7f0000001700)="24ac14c3c64cd634ba9ee143a1f86e5050b824073f49b8a155c3a8ecb78273249c173d37b5c2f79cabaac7dd7262ccc53ea15cb1f1e0598502c83f389386a39534b26ab3ba87a117f2bf146c291a1f92d6f0ebd10468327d7a88969b330841206b9f7fce12136ea29e38163b82a6a785ab0d17e463071ced63771f43f1024196db6e05e5b8bc55ab8a902c08713bc96cb4854c4aa5b2fb8d69901c16abfe6bd3baef8041b34ce69a3ffb8e20b1bec1e9f3d82496db7121eec441814e99752e1796843197017b6ed416f154d0d20ea2", 0xcf}, {&(0x7f0000001800)="aa8edfdbf13b2cef03e20864097ee119646a7bbac8f479a3d1759c16be9c50bb1507c36d89f5554b241711a98b5adc390f4338456977f933f31101bb301a287f6f67a26c23703fba96cf82d707869f17917355b27d468b9e2ab7a4a8cf68ca00d5f62bfb2a230b62b494d7d065cd16f5e7f098c648fe3405768b41bed3ad6bbdbfd32525c788d582051b9e96bbe0495f493d947977c36c8afe6dd4a70693caf386ee72d8652058c8e80bfefed5d15811155984b1d088b00c703fa6b1e5f1be80a0ef3645d0b61669abb2230a7483a65fa9beb9248bcfdc4dabd99da6c60565eeb8569c1a35ba0cd0d7fa", 0xea}, {&(0x7f0000001900)="80b99cc4c1a38196a03aee26e5ef206188b8c3ccb924e26fe6553772d58092f5ec621137f1df4ae02da1211d28d619209b97c39af169a5aabb99981f5bfa4d70c954ccf179e37404318eb4255a2339bff8e8520898d07e97d382dcb670f3c9f65e55a0d006c9b5a63789deaa2debaf051f9abb145db88716adb0fa009b1c23c6a8daff92fda5bac5556f888dcf8b9909bd983a5d5b7635b47c93c68afd05498ef75a7f81851ffc5a8126b6c6a6130ce70b986e6688864d1acc861577b5ef47cca2aa08", 0xc3}, {&(0x7f0000001a00)="6a7510cb20a65b6dcbc31472b5c20639de36d351ef4503c64a471aa428345a76d75cc3752bd6d5cc429c4a749230ae27eca2055873e8dfe2dfc631a5e5bccb6a0abdd4f3230c5aa09bdd6f8ed18027c8bf6ef918593117e730b73cf7bda984757a8efa778140e31149ffaa72ae5cdca3dad849bdbe38c82741edda8a18054e3d5040e9b727b9d01abc3664a17962cdeb0563c8730f03bed05251557c1aea09133f52adc5d7ac887f9643a048ff2eb0e2", 0xb0}], 0xa}}], 0x2, 0x4040081) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:49 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x4c8000, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r7}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={r7, 0x3}, 0x8) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000080)=0x400) sendmsg$rds(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0xfffffffc, 0x0, 0xffffffffffffff93, 0x20000030}, 0x40010) 00:24:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) 00:24:49 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) 00:24:50 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$CHAR_RAW_FLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)=0x1) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000040)={0xa, 0x0, @rand_addr=0x64010101}, 0x10, 0x0}, 0x14000044) r1 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x90$\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, r1, &(0x7f0000000140)=""/12, 0xc) 00:24:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:24:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000040)=0x5) 00:24:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x1) 00:24:50 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) socket$rds(0x15, 0x5, 0x0) 00:24:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@l2={0x1f, 0x7f, @none, 0x6}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x4, 0x40, 0x6, 0x3, 0x2, @private1, @remote, 0x0, 0x40, 0x5, 0x8000}}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r4 = socket(0x11, 0x4, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r3, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) r7 = memfd_create(&(0x7f0000000000), 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x40, 0x40, 0x4, 0x8001, {{0x13, 0x4, 0x3, 0x25, 0x4c, 0x65, 0x0, 0x0, 0x2f, 0x0, @multicast2, @remote, {[@cipso={0x86, 0x38, 0xffffffffffffffff, [{0x0, 0xb, "f201895ee510578720"}, {0x5, 0x6, "78151291"}, {0x1, 0xe, "04f817f11aae8eb5e7feec0b"}, {0x7, 0x6, "d71f73b7"}, {0x5, 0xd, "7224b6821fc80679702913"}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000005c0)={&(0x7f0000000840)={0x6c, 0x0, 0x20, 0x70bd25, 0x25dfdbfb}, 0x6c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4050) 00:24:50 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x50d42, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000400)=0x200) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="7d0800000000000000d619"], 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)={0x2e0, r4, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xd0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbad}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x418}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e2d}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xc4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xac, @local, 0x7747}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x42}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9a8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4d4b}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x40}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa74}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x800}, 0x40) 00:24:50 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:50 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x8a6, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4044800) 00:24:50 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@dev}, &(0x7f0000000040)=0x14) 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:51 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:51 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:51 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) [ 876.657999][ T28] audit: type=1326 audit(1595723091.198:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6652 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0x0 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:51 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) socket$xdp(0x2c, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:24:51 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:51 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:51 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) recvmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000040)=""/182, 0xb6}, {&(0x7f0000000100)=""/127, 0x7f}, {&(0x7f0000000180)=""/120, 0x78}, {&(0x7f0000000200)=""/232, 0xe8}, {&(0x7f0000000300)=""/128, 0x80}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=""/167, 0xa7}, 0x101) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) connect$inet(r1, &(0x7f0000001500)={0x2, 0x4e24, @private=0xa010102}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000001580)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f00000017c0)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001640)={0x160, r4, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x144, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x20bc1a36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x249d661e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x73da9580}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf0f4}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd2a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61d3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfc4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd24}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e8b1e16}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53537a4a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f31c2af}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x36c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd1d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e8bd205}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77e890ad}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x43de50e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x561d8092}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d94}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7cd9}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5b32}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5320818d}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3de1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e79eea1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa972}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x70d48a98}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd739}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40f5aad0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x746ff866}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x996b}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19a214b2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x41b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7be3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf22}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8a3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd11f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x541b62e}]}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000080}, 0x20004040) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:24:51 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0x69ec233f, 0x0, 0x8, 0x40, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000140)={r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r7, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:51 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) [ 877.217519][ T28] audit: type=1804 audit(1595723091.758:23): pid=6679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir145550365/syzkaller.xULrCQ/1687/file0" dev="sda1" ino=15770 res=1 [ 877.297952][ T28] audit: type=1804 audit(1595723091.808:24): pid=6679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir145550365/syzkaller.xULrCQ/1687/file0" dev="sda1" ino=15770 res=1 [ 877.440237][ T28] audit: type=1326 audit(1595723091.978:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6652 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0x0 00:24:52 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa2003}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x140b, 0x0, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:52 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:52 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x4000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r7, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x72e0e61e2dbf1d11}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010026bd7000fedbdf25200000000c009900a0f3ffff0400000008000300", @ANYRES32=r6, @ANYBLOB="08000100040000666a378b1617f892050b9e9db8b80008000300", @ANYRES32=r9, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x20000081}, 0x40) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000040)=""/3, 0x3}, &(0x7f0000000080), 0x1}, 0x20) 00:24:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:52 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:52 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x5c) accept4$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80000) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:52 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000000)=""/134, &(0x7f00000000c0)=0x86) r1 = socket$rds(0x15, 0x5, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000100)={0x4, 0x7, 0x1, 'queue1\x00', 0x40003}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:24:52 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x2c2, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:52 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4688142, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$setlease(r0, 0x400, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000001000000020ac500918d536566fc53571483d70605216e503249080995c621a858ef7d32cb5467ca1bdd8c2f681db278e03c35ce818fd5d201b91e8bceb5f5128d2dcf207c612fd943e497fca4e1884daf5c0efafa791a266a49c63b035578ee299a58de2b61daa85473b6ea2f9dfcbcd8afc08771fc6449c0c5ae39aa812e4a870b3138797df91c486a905bdf08876b0900960d120b16c09d9db6b9bb5913190b21baeb84bd709b0e3b764a8113a2abfb031e7e5ad7bd8651ad407609d2238244b2d82a283280bebe4eddf0aa"], 0xd1) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r1) keyctl$dh_compute(0x17, &(0x7f0000000300)={0x0, 0x0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r5) keyctl$dh_compute(0x17, &(0x7f0000000300)={r3, r4, r6}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r9) keyctl$dh_compute(0x17, &(0x7f0000000300)={r7, r8, r10}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r6, r10}, &(0x7f0000000140)=""/247, 0xf7, &(0x7f0000000280)={&(0x7f0000000240)={'sha384-avx2\x00'}}) r11 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r11, 0x114, 0x3, 0x0, 0x0) 00:24:52 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) pkey_alloc(0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) connect$caif(r1, &(0x7f0000000080)=@util={0x25, "05087ec61a743955ecee7cc47ba1cbb7"}, 0x18) 00:24:52 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=@updpolicy={0x120, 0x19, 0x800, 0x70bd29, 0x25dfdbff, {{@in6=@ipv4={[], [], @multicast1}, @in6=@empty, 0x4e25, 0x2, 0x4e23, 0x7, 0x2, 0x0, 0x80, 0x0, r5, r7}, {0x3, 0x1ff, 0x7ff, 0x4b5, 0x1, 0x400, 0x400, 0x80000001}, {0x551, 0x9, 0x3, 0x7}, 0x7fff, 0x6e6bb5, 0x0, 0x0, 0x3, 0x3}, [@extra_flags={0x8, 0x18, 0x2}, @extra_flags={0x8, 0x18, 0x3ff}, @tmpl={0x44, 0x5, [{{@in6=@private2, 0x4d4, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x5}, 0x0, 0x0, 0x2, 0x5, 0x6, 0x4, 0x2}]}, @lastused={0xc, 0xf, 0x81}, @replay_thresh={0x8, 0xb, 0x80}]}, 0x120}}, 0x80) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r9, r8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x1, @remote}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r10}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r10, 0x80, "94d8f9", "f315b61533155c45a9ad8f92a07e604ce09c959678a05e9468e48e985443227ddbad02625d6e115857a400d98d4d614b3f7561696fa47f8f903cc640183a623c909d697dc4e3edada69b5ac59f2558a93311b7424daf69e7a5b1205934cbd7d31f146ee43a808ec2bb9de2b6a13e7658f6850fe813896fd62e3f51acbc6babc1339d6a81560dbbca465523db01e791db218828e8e7a10ee8e38318399c761d9b7b18003c29bdd36cbef646d0950ddad083018cb948f13ae2c09983cf6630a1386d7391350d88d6dee9e5b289cb9a2ca287d8ba0200d727ca1d74402da9f909b534929433d6fd7c2ff17bdf3e71c1d1dcf67747cb92b3fa2c1a4d9c7822a5902e"}}, 0x110) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r11, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) 00:24:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:52 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:52 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000040)=0x2) 00:24:52 executing program 3: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x10) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() process_vm_writev(r4, &(0x7f0000c22000)=[{&(0x7f0000000140)=""/102394, 0x19000}], 0x1, &(0x7f00000192c0)=[{&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000019140)=""/123, 0x86}, {&(0x7f0000019200)=""/29, 0x1d}, {&(0x7f0000019240)=""/123, 0xfffffffffffffeda}], 0x4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x0, 0x2, {r4}, {r6}, 0x1002, 0x1}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r11) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000019300)=ANY=[@ANYBLOB="02000000010005000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=r0, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="0400020000000000083cd3b79087bdd0cd000200", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="10000200000000002000070000000000"], 0x5c, 0x1) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, 0x0, 0x0) 00:24:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:53 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x511180, 0x0) fcntl$getflags(r1, 0x401) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000180)={0x0, 0x2, [], [@hao={0xc9, 0x10, @private2}, @enc_lim={0x4, 0x1, 0x6}]}, 0x20) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40140, 0x0) sendto$phonet(r3, &(0x7f0000000080)="3c31abe8d1e25d0727595e46945426f42bbf61da0238aa93defb5c774cdd2c40285f9386f42e408a8add081f07262d35941875bfdc96c5b9ebd45260dd13b681e0c529cd0480800f92001dec770d2ed66abe93ffba2cd903300c9a1d280f64aa31847da243736fa4d859b375d3352d3499", 0x71, 0x4000, &(0x7f0000000100)={0x23, 0x6, 0x0, 0x3}, 0x10) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) 00:24:53 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20000010}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x1000000, 0x4) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x2) copy_file_range(r1, 0x0, r2, &(0x7f0000000000)=0xffff000000000000, 0x7fff, 0x0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x400, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000881}, 0x20004800) 00:24:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x263, 0x4) 00:24:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name, {&(0x7f0000000040)=""/58, 0x3a}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x0) 00:24:53 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, &(0x7f00000001c0), 0x4c}, 0xa0) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x0) 00:24:54 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r6) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000005c0)={0x510, 0x0, 0x5, [{{0x1, 0x1, 0xd78, 0x7, 0x2, 0x6, {0x1, 0x81, 0x0, 0x1, 0x23, 0x2, 0x76, 0x1, 0xbcd1, 0x5, 0x2, 0x0, 0x0, 0x0, 0x1}}, {0x2, 0x1, 0x7, 0x800, 'batadv\x00'}}, {{0x6, 0x0, 0x1, 0x7, 0x1000, 0x0, {0x2, 0x1b4740000, 0x2, 0x3, 0x81, 0x7, 0x5, 0x3, 0x80000000, 0xff, 0x135, 0x0, 0x0, 0xdf65, 0xeb6}}, {0x3, 0x4, 0x7, 0xfff, ',&{,\\*-'}}, {{0x6, 0x1, 0x5, 0x5, 0x8, 0x101, {0x0, 0x3, 0x7fffffff, 0x1, 0x7f, 0x1000, 0x100, 0x0, 0xc9, 0xfffff001, 0x6, 0xee00, 0x0, 0x9, 0x40}}, {0x2, 0x80, 0x1, 0x8000, '.'}}, {{0x3, 0x0, 0xd1, 0x66, 0x1, 0x1, {0x4, 0x9, 0xffffffff, 0x9fd, 0xd37, 0x7, 0x80, 0x9, 0x8000, 0x200, 0x7fffffff, 0x0, 0x0, 0x8, 0x2}}, {0x5, 0x6, 0x7, 0x8001, 'batadv\x00'}}, {{0x4, 0x0, 0x45, 0xffffffff, 0x0, 0x80000000, {0x2, 0x0, 0x3, 0x1010000001, 0x3, 0x1, 0xff, 0xffffff01, 0x7, 0x7, 0x200, 0x0, 0x0, 0x1, 0x8}}, {0x4, 0x1, 0x7, 0xffff, 'batadv\x00'}}, {{0x6, 0x3, 0x2, 0x4, 0x64, 0x8, {0x3, 0x10000, 0xffff, 0x8, 0x2, 0xb058, 0x1, 0x195d, 0x3ff, 0x9, 0x8, 0x0, 0x0, 0x2, 0x1a}}, {0x4, 0xff, 0x7, 0x1, 'batadv\x00'}}, {{0x3, 0x0, 0x7, 0x7ff, 0xffffffdd, 0x2, {0x2, 0x1000, 0x8, 0x0, 0xfccd, 0xd1, 0x1, 0x5, 0x3f, 0xc9, 0x8, r4, r6, 0x9, 0x1f}}, {0x4, 0x0, 0x5, 0xffffffff, '0{/&,'}}, {{0x0, 0x1, 0x7, 0x0, 0x5, 0xfffffffc, {0x8, 0x10001, 0x5, 0x9, 0x5, 0x897e, 0xff, 0x9, 0xf56c, 0x7, 0x1f, r8, r10, 0x6, 0x10000}}, {0x2, 0x9, 0x2, 0x9, '+\xed'}}]}, 0x510) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r3, 0x301, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r3, 0x1108, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="cb771e11a141"}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xb4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xfffff000}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 00:24:54 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, 0x0, 0x0) 00:24:54 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:54 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4e1e, @remote}, 0x10, 0x0}, 0x10) r2 = dup(r1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xfff}, 0x8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000000)) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 00:24:54 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, 0x0, 0x4c}, 0xa0) 00:24:54 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000), 0x4) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 00:24:54 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14, r2, 0xf01, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) timer_delete(0x0) ioctl$SIOCAX25GETINFOOLD(r3, 0x89e9, &(0x7f0000000040)) 00:24:54 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 00:24:54 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:55 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = memfd_create(&(0x7f0000000000), 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) syz_usb_connect$hid(0x1, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x1784, 0x16, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x20, 0x0, 0xd4, [{{0x9, 0x4, 0x0, 0x9, 0x2, 0x3, 0x1, 0x0, 0x3, {0x9, 0x21, 0x4dd, 0xff, 0x1, {0x22, 0x9ce}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0x5, 0x2}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0x7f, 0x67, 0xbe}}]}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x0, 0x8, 0x40, 0x20, 0x1}, 0x10, &(0x7f00000000c0)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0xd5, 0x9, 0x1, 0x2, 0x1f}]}, 0x7, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x44a}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x409}}, {0xad, &(0x7f0000000180)=@string={0xad, 0x3, "5d3c35bebad7d8879156dec9a87030c2470f3199c5a9bce47360622f5ceba4fedf5198219a1a1a0f463761ff19c24ab2b6b990991cd15d40d1d0deae7c36366922c46138d7144b54131b134e267d6f3f1b658bc6e043fa300ca1baad457f8e57ea166d091a5561ffbb763e075553e1d17d92b6c402a84e55ee2317a5559351c9df86dc8e5b437f1a0241e0220c3c0753a9f212ac73256628e4182ccef9f96085e655a2232f31f51e7af136"}}, {0x62, &(0x7f0000000240)=ANY=[@ANYBLOB="6203730875f805b936ff6b1f8eff29fa5d6d7bab71147cca3a03367b525fa9d767db693638b56c92614fc0439f66e834adde19a473df37958b5b12609ba921a7186eadb92bbeafb405949b5b8315043916c2e905a777efaa3ec268da067a08000000"]}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x813}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x404}}, {0x9e, &(0x7f0000000340)=@string={0x9e, 0x3, "04effca836af6557c6272ed86bd7676c351e59df4d4dc6fb20a098a4a296a8967bade302611ca1c35cf2d51b110b0ba4ed80ae918305576dfb6a9f95718bce095a93cfac7731efdc0afc94764dabbf8361d3e3add80e3a54e2d521ea2fffbeab181f441a4cd5ea7a350ac506b4307286fcbaca6aac9ff071f0a660687b7dbe1f3ae08aabe838ee498d374d0560e8b1f061fd24ab8eeadb658ba11e87"}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:55 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = io_uring_setup(0x5bbd, &(0x7f0000000000)={0x0, 0x0, 0x2}) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x8000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) readahead(r3, 0x4, 0x3) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r4 = syz_io_uring_complete(r2) r5 = socket$packet(0x11, 0x2, 0x300) r6 = memfd_create(&(0x7f0000000000), 0x0) r7 = accept4$phonet_pipe(r4, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f00000002c0)={0x2, 'veth1_to_hsr\x00', {0x3}, 0x1}) r8 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r8, 0x800443d2, &(0x7f0000000200)={0xa, &(0x7f0000000100)=[{}, {@fixed}, {@none}, {}, {}, {@none}, {}, {}, {@fixed}, {}]}) syz_io_uring_complete(r2) 00:24:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 00:24:55 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c12a126fc1a2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bcfde3294f6e73d06ad16dc2d26705ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6a1db45bad354fc1a3f20340547860f97d30d407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41eb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090234aaf7ea92f41aab73e7a85eef87e956bb7c5c76a34b20f000000000000b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc68c8079019996f5e65cab354149d9107d8a88b0aa5b5661555f00443ae"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x0, 0x0}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'gre0\x00', &(0x7f0000000800)={'ip_vti0\x00', 0x0, 0x7, 0x0, 0x0, 0x80000001, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x67, 0x0, 0x3b, 0x4, 0x0, @rand_addr=0x64010102, @broadcast, {[@ra={0x94, 0x4}, @generic={0x83, 0x2}, @timestamp={0x44, 0x8, 0x21, 0x0, 0x5, [0x9]}]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000004c0)={@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, {0x0}, &(0x7f00000001c0)}, 0xa0) 00:24:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 00:24:55 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) pkey_alloc(0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) connect$caif(r1, &(0x7f0000000080)=@util={0x25, "05087ec61a743955ecee7cc47ba1cbb7"}, 0x18) 00:24:55 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000140)) 00:24:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:55 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) pkey_alloc(0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) connect$caif(r1, &(0x7f0000000080)=@util={0x25, "05087ec61a743955ecee7cc47ba1cbb7"}, 0x18) [ 880.814655][ T9597] usb 1-1: new low-speed USB device number 3 using dummy_hcd 00:24:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$char_raw(&(0x7f0000000280)='/dev/raw/raw#\x00', 0x0, 0x101000) ioctl$CHAR_RAW_BSZGET(r4, 0x80081270, &(0x7f00000002c0)) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r6 = socket$packet(0x11, 0x2, 0x300) r7 = memfd_create(&(0x7f0000000000), 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0xe0, 0x10, 0x25f32caec8b44649, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="76a638dc0ffdacad096f8e5bd231646e1deeef2b5a4fc32e1790d016bce9f48c1324336761b070920636092c5c176a268d19e3c14387c45436", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, @generic="b96f78f6a7eea8424beef26010f71c6624130e762d227476e12fa1911933573696ab7db927a497484774fb6d03f6a8510e7da7e9f3406b39d4e4ec2fd65a55c4974246dce5c23edd54bf67983073474246ea8b4ab4b042a961c0a8a05a954543c5ac39eb776646cb5b6b1b4e7716dddb6b7141abfd00000000"]}, 0xe0}}, 0x0) r10 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r9, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x80, r10, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x26}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x100c8ab7a5a172f5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, '(&).\\{]\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '}%}\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000814}, 0x8d0) sendmsg$NLBL_MGMT_C_VERSION(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x6c, r10, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, 'veth1_vlan\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2a}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00'}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '\xd5[\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40001}, 0x4011) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r11 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$IP_VS_SO_SET_FLUSH(r11, 0x0, 0x485, 0x0, 0x0) 00:24:55 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r5, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}, 0x1, 0x6c}, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000240)={0x5, 0x0, [{}, {}, {}, {}, {}]}) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="b630377e", @ANYRES16=r5, @ANYBLOB="000826bd7000fbdbdf250300000008000300030000000500050003000000"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x48004) [ 881.054189][ T9597] usb 1-1: Invalid ep0 maxpacket: 64 [ 881.220243][ T9597] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 881.474197][ T9597] usb 1-1: Invalid ep0 maxpacket: 64 [ 881.479672][ T9597] usb usb1-port1: attempt power cycle [ 882.194106][ T9597] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 882.284870][ T9597] usb 1-1: Invalid ep0 maxpacket: 64 [ 882.434100][ T9597] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 882.525839][ T9597] usb 1-1: Invalid ep0 maxpacket: 64 [ 882.531334][ T9597] usb usb1-port1: unable to enumerate USB device 00:24:58 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000000100)={0x3, 0xfffff40f, 0x4, 0x84000}) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r7}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r7, @in={{0x2, 0x4e24, @multicast2}}, 0x20, 0x1, 0x2, 0xfff, 0x80, 0x6, 0x7}, &(0x7f00000000c0)=0x9c) 00:24:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) pkey_alloc(0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) connect$caif(r1, &(0x7f0000000080)=@util={0x25, "05087ec61a743955ecee7cc47ba1cbb7"}, 0x18) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, 0x0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:58 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008044}, 0x40) 00:24:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="012000000000000000000b00000018000180140002007665debd4b3e7468315f766c616e0000000000002b8f6f8227ef73e11bec017db47ea92f06491bf93c5c5b4e186f295abac12834b3052815d8fed84006f8aaddf79acf89d20595184f0bbfca9633157d15b73638430cddd8fa60dbe270b885ae86587243fcff6983508683cea6d7b9f08745c12b68583ba9f268e771c61c37be91"], 0x2c}}, 0x0) 00:24:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@buf={0xa4, &(0x7f0000000000)="22ec75886b20819f0c0e70a96d503e27718437b6d8d524b7532b9504d6ff9499b3566fd8370de58942f3ae0a36999540a3c72ee9ec900d32a8921dd4954e91d43f5beb04f92a839074bc5885f3c36a8e88c64ac299f025a72e0d47f2b53ac89456b376107a89c31011d9d5da9eeb0b7e3b203a18d8dd5414c4da58105280ee1715280ba8937aecfdd7ebe5ef3c6590ccec0e2bf8fd5c55e6939cdd1eefa3d88fc444bf09"}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x280, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, r5, 0x301, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r3, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r5, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000840) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x81, 0x1, 0x3, 0x5}, 0x10) r6 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r6, 0x400, 0x0) read$snddsp(r6, &(0x7f0000000280)=""/1, 0x1) keyctl$get_security(0x11, r2, &(0x7f0000000180)=""/128, 0x80) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:24:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) pkey_alloc(0x0, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:58 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) socket$rds(0x15, 0x5, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x24) 00:24:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000080)='gre0\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000140)=""/101) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000280)=""/140) 00:24:58 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(r2, 0x40044145, &(0x7f0000000080)=0x7fff) r3 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000001e00)={'syztnl2\x00', &(0x7f0000001d80)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x0, 0xfffffff8, 0x1, @empty, @loopback, 0x4008, 0x7800, 0x9}}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f00000020c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002080)={&(0x7f0000000500)=ANY=[@ANYBLOB="24020000", @ANYRES16=0x0, @ANYBLOB="000428bd7000ffdbdf3f0f0000002c1b018014000200776731000000000000000000000000001400020077673100000000000000000000000000480001801400020076657468305f6d6163767461700000001400020076657468305f746f5f688472000000001400020073797a5f74756e0000000000000000000800030001000000200001800800010034b9e98dce07a3f69ebdaec05ad13b6b2d40d83c9b97c0c3374433da645aaf4883def9a23f482365920c615f77e41e2b8741068cd6d301e0bd3e80049c020d881d774eb320a7af9a90a1c75b658acbb94475065802d18091258213cae720af", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f626f6e640000004c00018014000200697036746e6c3000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006d61637365633000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1acb0800", @ANYRES32=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="1c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3800018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020067726530000000000000000000000000080003000200000008000100", @ANYRES32=r4, @ANYBLOB="28000180080003000000000008000100", @ANYRES32=r7, @ANYBLOB="140002007465616d300000000000000000000000740001800800030001000000140002006970365f7674693000000000000000001400020067656e657665300000000000000000000800030003000000140002006d6163766c616e3100000000000000000800030000000000080003000100000014000200726f7365300000000000000000000000400001801400020067726530000000000000000000000000140002007465616d300000000000000000000000140002006e723000"/200], 0x224}, 0x1, 0x0, 0x0, 0x10}, 0x200008d4) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r8, 0x401) setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000040)=0x9, 0x4) 00:24:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x20, 0x4, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r3, 0x40044103, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x11fd]}, 0x0, 0x8) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r6, 0xc0205649, &(0x7f00000000c0)={0xfffffff, 0xbe800, 0x7, r7, 0x0, &(0x7f0000000080)={0x9909e1, 0x7fff, [], @value64=0x7}}) epoll_pwait(r8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x6, 0x8000, &(0x7f0000000180), 0x8) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:58 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0xffffffffffffff30) 00:24:58 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) 00:24:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$netlink(0x10, 0x3, 0x0) accept(r3, &(0x7f0000000140)=@qipcrtr, &(0x7f0000000040)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r1, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:24:58 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDMKTONE(r3, 0x4b30, 0x9) 00:24:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) dup(r5) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010089b6aff4000000000b00000018000180143d245f0ece73f3b8faadeb6d650002007665746e000000000000915a90562e3b899d488f0983ac8c7230b119c0194dcb95e9fc2f2735c97158e46ccecce69bf37a07b6c5fd0e094991a8b222e3338053aa422c00"/114], 0x2c}}, 0x0) 00:24:58 executing program 2: socket$rds(0x15, 0x5, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) 00:24:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) pipe(&(0x7f0000000000)) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000040)=0xffffffff, 0xfe91) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}]}, 0x40}}, 0x0) 00:24:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='-$%/,\x00', &(0x7f0000000140)='!\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000240)=[&(0x7f0000000200)='\x00'], 0x1000) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0xba4) r4 = socket$rds(0x15, 0x5, 0x0) r5 = socket$qrtr(0x2a, 0x2, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x0, 0x82000) ioctl$VIDIOC_SUBDEV_G_CROP(r6, 0xc038563b, &(0x7f00000002c0)={0x1, 0x0, {0x0, 0x2, 0x1, 0x9bbe}}) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080)=0x20) sendmsg$rds(r4, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x4e24, @loopback}, 0x10, 0x0}, 0x841) [ 884.152248][ T6963] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 00:24:58 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @dev={[], 0x44}, 'veth1_to_bond\x00'}}, 0xfffffe94) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) ioctl$CHAR_RAW_IOMIN(r4, 0x1278, &(0x7f0000000080)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200600, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x3, 0x0, 0x4f) eventfd2(0x6, 0x800) 00:24:58 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x841, 0x0) 00:24:58 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010300000000000000000b00000018005607dd56020076657468315f766c616e0000efff00005703c2c56f9152fc5a99aef89178fafa3d0a3c"], 0x2c}}, 0x0) 00:24:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x38}}, 0x0) 00:24:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4098}, 0x20000000) 00:24:58 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$netrom(r3, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f00000000c0), 0x2) 00:24:58 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x841, 0x0) 00:24:59 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}]}, 0x30}}, 0x0) 00:24:59 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r2, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}, 0x0, 0x2}}, 0xce, 0x0}}], 0x2, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="913e80e21a1d7b93a55c9f85b94e1fb2fc2b12d7c1ce8dadb23748d0", 0x1c, 0x81, &(0x7f0000000080)={0x11, 0x1a, 0x0, 0x1, 0x1}, 0x14) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0x10, 0x0}, 0x0) 00:24:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r7, 0x400, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r8, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="90b03182", @ANYRES16=r3, @ANYBLOB="010000000000000000000b0000000c000180080003000200000060000180140002007767310000000000000000000000000008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006e657464657673696d3000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020073797a6b616c6c65723000000000000008000100", @ANYRES32=0x0, @ANYBLOB="05000600050000000500020009000000"], 0x90}}, 0x0) 00:24:59 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x841, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x28}}, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x24}}, 0x0) 00:24:59 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x841, 0x0) 00:24:59 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000258f88)) msgrcv(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000000000000000000000001000000ffff00"/52], 0x34, 0x2, 0x3800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$x25(r3, &(0x7f0000000080)=""/99, 0x63, 0x121, 0x0, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) 00:24:59 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) 00:24:59 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) 00:24:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x24}}, 0x0) 00:24:59 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x42c}, 0x1, 0x0, 0x0, 0x8084}, 0x4c040) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) fcntl$setlease(r1, 0x400, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x102, 0x2, {0x6, 0x9, 0x3, 0x8}}) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r7}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000580)={r7}, 0x8) 00:24:59 executing program 2: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) 00:24:59 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = io_uring_setup(0x635e, &(0x7f0000000000)) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x8000000) syz_io_uring_complete(r2) r3 = syz_io_uring_complete(r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x30, r5, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x30}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 00:25:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) 00:25:00 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0xc}, 0x2, 0x1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) 00:25:00 executing program 0: socket$rds(0x15, 0x5, 0x0) 00:25:00 executing program 1: sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40800}, 0x8081) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000040)) 00:25:00 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r5, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd93}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}, 0x1, 0x6c}, 0x0) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000240)={0x5, 0x0, [{}, {}, {}, {}, {}]}) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="b630377e", @ANYRES16=r5, @ANYBLOB="000826bd7000fbdbdf250300000008000300030000000500050003000000"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x48004) 00:25:00 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000140)) 00:25:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r4, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, r4, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) write$binfmt_elf64(r5, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x40, 0x1f, 0x2, 0x7fffffff, 0x3, 0x3e, 0x3, 0x144, 0x40, 0x244, 0x1000, 0x101, 0x38, 0x1, 0x7, 0x400, 0x61}, [{0x4, 0x4, 0x26, 0x5, 0x8, 0x4, 0x4, 0x5}], "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", [[], [], []]}, 0x476) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r9, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:00 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) accept$alg(r0, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x12400, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = memfd_create(&(0x7f0000000000), 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r8 = dup3(r7, r6, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r9}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={r9, 0xffffffff}, 0x8) ioctl$HIDIOCGNAME(r5, 0x80404806, &(0x7f0000000180)) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f00000001c0)=""/82, 0x52}, &(0x7f00000000c0), 0x4}, 0x20) 00:25:00 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x400) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) ioctl$RTC_WIE_ON(r4, 0x700f) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @private=0xa010101}, 0x10, 0x0}, 0x0) 00:25:00 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000000)=""/128, &(0x7f0000000080)=0x80) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:25:00 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4688142, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$setlease(r0, 0x400, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000001000000020ac500918d536566fc53571483d70605216e503249080995c621a858ef7d32cb5467ca1bdd8c2f681db278e03c35ce818fd5d201b91e8bceb5f5128d2dcf207c612fd943e497fca4e1884daf5c0efafa791a266a49c63b035578ee299a58de2b61daa85473b6ea2f9dfcbcd8afc08771fc6449c0c5ae39aa812e4a870b3138797df91c486a905bdf08876b0900960d120b16c09d9db6b9bb5913190b21baeb84bd709b0e3b764a8113a2abfb031e7e5ad7bd8651ad407609d2238244b2d82a283280bebe4eddf0aa"], 0xd1) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r1) keyctl$dh_compute(0x17, &(0x7f0000000300)={0x0, 0x0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r5) keyctl$dh_compute(0x17, &(0x7f0000000300)={r3, r4, r6}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r10 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r9) keyctl$dh_compute(0x17, &(0x7f0000000300)={r7, r8, r10}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r6, r10}, &(0x7f0000000140)=""/247, 0xf7, &(0x7f0000000280)={&(0x7f0000000240)={'sha384-avx2\x00'}}) r11 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r11, 0x114, 0x3, 0x0, 0x0) 00:25:00 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000140)) 00:25:00 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040), &(0x7f0000000080)=0x10) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x1, [], "6ff5d00874e1308261231c34fcd7152b"}) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:00 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) ptrace$setsig(0x4203, r0, 0x6000000000, &(0x7f0000000140)={0x41, 0x2, 0xfffeffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRESDEC=r7, @ANYBLOB="010900000000000000002cf59b39160001801400020076657468315f766c616e000000000005"], 0x2c}, 0x1, 0x0, 0x0, 0x87bdb8c7918c49d9}, 0x0) 00:25:00 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000000)=0x4) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r8) write$P9_RGETATTR(r4, &(0x7f0000000040)={0xa0, 0x19, 0x2, {0x901, {0x20, 0x2, 0x5}, 0x20, r6, r8, 0x4, 0x1, 0x9, 0x3, 0x8, 0x55, 0x0, 0x2, 0x745a, 0xeb0, 0x20, 0x9, 0x400, 0x4}}, 0xa0) 00:25:00 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000140)) 00:25:00 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0xa, 0x4e24, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x20000050) 00:25:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x20}}, 0x0) 00:25:00 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) syz_usb_connect$printer(0x5, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x1, 0x80, 0x2, [{{0x9, 0x4, 0x0, 0x4, 0x1, 0x7, 0x1, 0x2, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x3, 0x80, 0x5b}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x310, 0xff, 0x20, 0xd8, 0xff, 0xff}, 0x5, &(0x7f00000000c0)={0x5, 0xf, 0x5}, 0x3, [{0x28, &(0x7f0000000280)=ANY=[@ANYBLOB="28030c6ffaefd10b7d834db96c21810f10ed9b7ba98d6b1930ba0e391b36adcd18d9981897d8481257bd1c2e8e8288aec415a760473d6b2b"]}, {0x93, &(0x7f0000000140)=@string={0x93, 0x3, "77e2ab2e7e218758739c44b656a8b6c50ae6006d7e9486a6e4bb1aac282aca92ba9acdb4c55ee1bdd56af35fab2bb5cb8e5a1488f06daabff4e65b6dc89ada8bf140d0a7b0904b968e3e852c79e8ca6d6dfcc4d23a3f43fb7421182bc6ebdfef5a50194111e5e3865bab91c7354825d1230ee7eb66d636fd48d35d4fd0692c25a7fdd7ce199195ec5bce0afae39c01bb9f"}}, {0x7a, &(0x7f00000002c0)=@string={0x7a, 0x3, "36b3b085e656f60533015403f7a48d8604af2ff7621345f0a07062e2c010f9629165b60ae563877f48c519111d6e2a4affc3e62161cde602f45804f3afdd13a4818a60838ae91d3f888045aa702afb71ecd5777c29c1f0e4f84452bfdbc887cb31589cf775083e9e2e52e6a94bceb793209f24b194033c4e"}}]}) 00:25:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x6) 00:25:00 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:01 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) readahead(r1, 0x9, 0xf6d) 00:25:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_DELTABLE={0x7c, 0x2, 0xa, 0x104, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}]}], {0x14}}, 0xa4}}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000040)={0x0, 'veth0_to_batadv\x00', {0x4}, 0x1f}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r4, 0x200, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x0, 0x6, 0x7}]}, 0x20}}, 0x0) 00:25:01 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:01 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x84020, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x10b) fcntl$setlease(r2, 0x400, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xcc, 0x2000) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4e23, @remote}, 0x10, 0x0}, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) 00:25:01 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1d}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x48}}, 0x0) 00:25:01 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) [ 886.733932][ T2950] usb 4-1: new high-speed USB device number 3 using dummy_hcd 00:25:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100106}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r7, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xda}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vlan0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x10004}, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x18, r3, 0x10, 0x3, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0) 00:25:01 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r6, 0x4, 0x2, 0x8}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:01 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x1, 0x7b1804) [ 887.023760][ T2950] usb 4-1: Using ep0 maxpacket: 16 [ 887.144604][ T2950] usb 4-1: config 1 interface 0 altsetting 4 bulk endpoint 0x1 has invalid maxpacket 8 [ 887.159949][ T2950] usb 4-1: config 1 interface 0 has no altsetting 0 [ 887.344508][ T2950] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 887.353588][ T2950] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 887.409107][ T2950] usb 4-1: Product: 댶薰囦׶ij͔ꓷèšê¼„á¢ï…炠Ⴠ拹斑શæ¥ç¾‡ì•ˆá„™æ¸ä¨ªì¿â‡¦ìµ¡Ë¦å£´ïŒ„ê“èªè î¦Šã¼è‚ˆê©…⩰燻헬籷섩䓸뽒죛쮇報ࡵ鸾刮ꧦ칋鎷鼠네Δ丼 [ 887.434289][ T2950] usb 4-1: Manufacturer: ⺫ⅾ墇鱳뙄ꡖ얶洀鑾Ꚇ믤갚⨨鋊骺ë“廅뷡櫕忳⮫쮵媎蠔淰뾪浛髈诚䃱êŸé‚°é™‹ãºŽâ²…淊ﱭ틄㼺ףּⅴ⬘åšä„™î”‘蛣꭛작䠵턥ร홦ﴶíˆä½æ§â”¬ï¶§ì»—é„™î²•ì¹›ï¨Šé³£ë¬ [ 887.458324][ T2950] usb 4-1: SerialNumber: syz [ 887.485419][ T7122] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 887.770207][ T2950] usb 4-1: USB disconnect, device number 3 00:25:02 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000000)={0x0, 0x1}) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) 00:25:02 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x1f}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000040)={0x8001, r3, 0x2, 0x7c0}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:25:02 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:02 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r6, 0x4, 0x2, 0x8}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:02 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000040)={0xa, 0x0, @remote}, 0x52, 0x0, 0x0, 0x0, 0x0, 0x4014}, 0x814) 00:25:02 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) getsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r6 = socket$packet(0x11, 0x2, 0x300) r7 = memfd_create(&(0x7f0000000000), 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r10, 0x800, 0x0, 0x25dfdbff}, 0x14}}, 0x4008041) r11 = gettid() process_vm_writev(r11, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) ptrace$getsig(0x4202, r11, 0x9, &(0x7f0000000300)) sendmsg$L2TP_CMD_TUNNEL_CREATE(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r10, 0x20, 0x70bd26, 0x9, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xc96}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x8810) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r5, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:02 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r6, 0x4, 0x2, 0x8}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:02 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:25:02 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/35, &(0x7f0000000200)=0x23) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:03 executing program 3: socket$rds(0x15, 0x5, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80802, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000000c0)={0x9e0000, 0xc5e, 0x6, r2, 0x0, &(0x7f0000000080)={0x990969, 0xffff, [], @p_u16=&(0x7f0000000040)=0x9}}) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x3, 0x0, 0x11) 00:25:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000414ff8707f3bf3bda12aca374bbbbe6b699950f6872aea91931c719cbf85b5c71bc60060c30e08e076cf8e96ea681773fcaaaad19d39adfabbbd8f918998b546bba37ced533dd13ba934717c7b7d64500bbd9755b4e0f116e58d30aaa842ad9a08523637eee79c7358b537e191a20d65ddb6952242", @ANYRES16=r4, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) 00:25:03 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = dup2(r3, r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r7, 0x1, 0x0, 0x0, {0x2f}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x18c, r7, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x20840}, 0x4004880) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x168, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x1000}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80000001}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x1000}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xff}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x7ff}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x800}}]}, 0x168}, 0x1, 0x0, 0x0, 0x4004081}, 0x24000080) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x121440, 0x24) 00:25:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) read$hidraw(r6, &(0x7f0000000180)=""/140, 0x8c) r7 = memfd_create(&(0x7f0000000000), 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f0000000140)=0x1, 0x4) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r9, 0x89fa, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'syztnl0\x00', r10, 0x2f, 0x6, 0x6, 0x800, 0x2b, @rand_addr=' \x01\x00', @local, 0x8, 0x40, 0x8, 0x8c7c}}) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r6}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:03 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000180)=0x6, 0x4) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:03 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x440}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ftruncate(r2, 0x9e) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f0000000040)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000094}, 0x0) 00:25:03 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$SNDRV_PCM_IOCTL_STATUS32(0xffffffffffffffff, 0x806c4120, &(0x7f0000000600)) timer_create(0x5, &(0x7f0000000540)={0x0, 0x1c, 0x2, @thr={&(0x7f0000000500)="a39f13bcc2afbc2e010559ffa8aad822188c87a1c29641d33ae60671e1d18f594dcd77c352dc2e85cb", &(0x7f0000000780)="0f8a572f143bce2265f74fa68a89ce5663275dbd4d5fb7ff20ffeb1d631b1113aa2e6bf2a2131cdee5613fc1dcefed169154f60be3ad9315731cfd507ca5376113c966a96a494fcf4efe0a48773c8736817a243449085ce6ed800da7b50fe76338c67747e83cd95c58ad6414d22d4c0ba5c743207da613353b"}}, &(0x7f0000000800)=0x0) timer_gettime(r4, &(0x7f0000000840)) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="60000000041400022bbd7000fddbdf2508000100000000000800010001000000080001000100000008000100020000000800010000000000080001000100000008000100000000000800010002000000080001000100000008000100010000001937c833bb7420fa0604335cd8237f73103e7a87b283e012dbf0c880a7ff7c62d520480bda75d232662ca7028e1cf340c1f952c3aadf4633fd98f641ba4ce5e0a4835dba007dafa4a43458d5b37ccc4ce04a967aac3e8bb89b646eec40b8cfcfbbace0ca35db6945dcedf96780"], 0x60}, 0x1, 0x0, 0x0, 0x11}, 0x20004000) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/179, 0xb3}, {&(0x7f00000000c0)=""/174, 0xae}, {&(0x7f0000000180)=""/110, 0x6e}, {&(0x7f0000000200)=""/247, 0xf7}], 0x4, &(0x7f0000000340)=""/211, 0xd3}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x4042010, r5, 0x10000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000480)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x4007, @fd_index=0x8, 0x9, 0x0, 0x0, 0xc, 0x1, {0x1}}, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r4 = dup3(r3, r2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x17) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:03 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r7, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) dup3(r3, r2, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:03 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000200)={r6, 0xc2c4, 0x61db, 0x5a1}) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) [ 888.998690][ T28] audit: type=1400 audit(1595723103.539:26): avc: denied { ioctl } for pid=7233 comm="syz-executor.1" path="socket:[141053]" dev="sockfs" ino=141053 ioctlcmd=0xf509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 00:25:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r3, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:03 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:03 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) write$rfkill(r0, &(0x7f0000000200)={0x8, 0x5, 0x3, 0x1, 0x1}, 0x8) r1 = socket$rds(0x15, 0x5, 0x0) clone(0x40000000, &(0x7f0000000000)="ffa41c0af8d46f5761ea4a5feb35ad5947efd65cb691998edcc58327737532624f634c7195bd0ee7c1727f8c1d44fa44c274993ba8755d0212e65eeeada26e594845b8e99f3b319c3ce60bd8e722d91ca7559478282dd167cd3d68e147de16f307922407402a51eb664747b4571d30031a7ec54da58439dcb31b8db35556e415b39a9454ba3eb2eab68c0ff1424facaf19be9b40067fe47f2b02f710e5ec6900e63de07bf2a268a60e5b5dc8b9bb106dfe43c649b87d5ee855777053949241480ccc", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="482cb4f4abc26f16fab0b1f1fc7ddac1d32470da331aa52a21b485288ff2e69272d0db91320d2b2676198d03dec4a973c23d4d61bcae6f766ac9db995af74c4c6c18f81502fe29e814d2ec129a63ab1ad82d7987d90d183028115c050ef62d") setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, 0x0, 0x0) 00:25:03 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) tee(0xffffffffffffffff, r1, 0xf5, 0x5) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(0xffffffffffffffff, 0xc0984124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 00:25:03 executing program 1: uselib(&(0x7f0000000080)='./file0\x00') r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @local}, 0x34, 0x0, 0x3e, 0x0, 0x0, 0x4000885}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000040)=0x200004) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x5) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:03 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:03 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) 00:25:03 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="201026b3292c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000"], 0x2c}}, 0x0) [ 889.375146][ T7262] IPVS: ftp: loaded support on port[0] = 21 00:25:03 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r5) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) fsetxattr$system_posix_acl(r2, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x3}, [{0x2, 0x4, r3}], {}, [{0x8, 0x1}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x0, r8}], {0x10, 0x1}, {0x20, 0x4}}, 0x4c, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000040)={0x2, @sliced={0x2, [0x1f, 0x20, 0xa7, 0x7be0, 0x101, 0x29c, 0x0, 0xff, 0x8, 0x8000, 0x6, 0x4, 0x5, 0x8000, 0x4, 0x8161, 0x1, 0x5900, 0xfff, 0x2, 0x6, 0x3f, 0x8001, 0x5c3f, 0x7, 0x8, 0x3ff, 0xfff9, 0x7, 0x166, 0x0, 0x3, 0xa7d, 0x7, 0x6, 0x10, 0x5, 0x85e, 0x1, 0x40, 0x6, 0x8, 0x8, 0x3504, 0x401, 0x6, 0x8, 0xc7], 0x80000000}}) 00:25:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:04 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:04 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x3, 0x1, 0x801, 0x70bd27, 0x25dfdbfb, {0x2, 0x0, 0x6}, [@generic="9fbdcc9c53ea649f68fe0181ee9ff0b0b5f3fcadd2dde13294ff664afb1ae2cea4633b4b957cdd1f39219e44613629aaf028b8ce2f6ccca324e4701807a020ec17fc37d298887c62c7b4e04d19677979cbf43aa6b58bd93d7338b638aa573dc3df936d7fd5aa9c41ea6dfad5fedab2151c06d30b48543dadfa87", @typed={0x8, 0x5, 0x0, 0x0, @pid=r2}]}, 0x98}, 0x1, 0x0, 0x0, 0x24000000}, 0x20008051) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) [ 889.614608][ T7264] IPVS: ftp: loaded support on port[0] = 21 [ 889.743824][T12736] tipc: TX() has been purged, node left! 00:25:04 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x3, 0x1, 0x801, 0x70bd27, 0x25dfdbfb, {0x2, 0x0, 0x6}, [@generic="9fbdcc9c53ea649f68fe0181ee9ff0b0b5f3fcadd2dde13294ff664afb1ae2cea4633b4b957cdd1f39219e44613629aaf028b8ce2f6ccca324e4701807a020ec17fc37d298887c62c7b4e04d19677979cbf43aa6b58bd93d7338b638aa573dc3df936d7fd5aa9c41ea6dfad5fedab2151c06d30b48543dadfa87", @typed={0x8, 0x5, 0x0, 0x0, @pid=r2}]}, 0x98}, 0x1, 0x0, 0x0, 0x24000000}, 0x20008051) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/88, &(0x7f00000000c0)=0x58) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000200)=0x778, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b000000180c555306e7d6189a8d636d000180140002007665746831"], 0x2c}}, 0x0) 00:25:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:04 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:04 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) fchdir(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0xffe1) [ 890.009880][ T7340] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 00:25:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:04 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000200)={r6, 0xc2c4, 0x61db, 0x5a1}) 00:25:04 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000000)={0x5e, 0x4, [], [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30) [ 890.103451][ T7346] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 00:25:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000efffffff0a000000180001801400020076657468315f01000100000000000000e36d339462b9ab7b3574a71191fa15f3c2815c7926747f2ec883f2cd26741af32f83b721274f7393a1c3aaffcdf9b496e1942fad8805748a19772f97663bc0dfb0d712a5e227413c0efcc75dcbf1417d1d0809d827ed47fec9c9d8befae7f0a1e7c4cc09d975507290e09822c1e52012f79d05fa55"], 0x2c}}, 0x0) 00:25:04 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x2e, 0x20, 0x15, 0xa, 0x5, 0x5, 0x2, 0xff}}) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)=ANY=[@ANYBLOB="e000000010004946000000000000000000000000080000007f0000014500008076a638dc0ffdacad096f8e5bd231646e1deeef2b5a4fc32e0b0790d016bce9f48c1324336761b070920636092c5c176a268d19e3c14387360800000000", @ANYRES32=0x0, @ANYBLOB="000000b96f78f6a7eea8424beef26010f71c6624130e762d227476e12fa1911933573696ab7db927a497484774fb6d03f6a8510e7dd4e4ec2fd65a55c4974246dce5c23edd54bf67983073474246ea8b4ab4b042a961c0a8a05a954543c5ac39eb776646cb5b6b1b4e7716dddb6b7141abfd00000000000000557388ac9ef50ef32b9ccfa933ec219b311fcfcb2a79f647402a6fa7f0ad6860ec4a695f3a0000000000"], 0xe0}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000", @ANYRES16=r3, @ANYBLOB="080026bd7000fcdbdf250300000008009f00ac1e010114000600fe800000000000000000000000000026080008006401010208000c00f572a1a508000800ac1e010114000600fe8000000000000000000000000000bb0c0001002826292e5c7b5d00080007007f000001080001007d257d00080008000a010100"], 0x80}, 0x1, 0x0, 0x0, 0x4000814}, 0x8d0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x0) 00:25:04 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000), 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8040, 0x0) read$dsp(r3, &(0x7f0000000140)=""/123, 0x7b) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r4, 0x400, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f00000000c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r7 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r9 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r9, 0x400, 0x0) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r10, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x54, r6, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}]}, 0x54}}, 0x0) 00:25:04 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xce2a, 0x200) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x7, 0x1}) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx2\x00'}, 0x58) 00:25:04 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000200)={r6, 0xc2c4, 0x61db, 0x5a1}) 00:25:05 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file1\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000040)=""/32) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0xff, 0x4) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r7, 0x401) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r8, 0x401) getsockopt$netrom_NETROM_N2(r8, 0x103, 0x3, &(0x7f0000000100)=0x1f, &(0x7f0000000180)=0x4) 00:25:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000200)={r6, 0xc2c4, 0x61db, 0x5a1}) 00:25:05 executing program 1: socket$rds(0x15, 0x5, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40002}, 0x0) 00:25:05 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:05 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:05 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r2) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r3}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'rmd160-generic\x00'}}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={r3, 0x32, 0x63}, &(0x7f0000000080)={'enc=', 'oaep', ' hash=', {'sha512-arm64\x00'}}, &(0x7f0000000100)="c1673367088ad3b71fec00de6ab61077f212c7a36955f70dcc82ab7d77fcd3aa396641f0649f80c7a65ed79f0f0937693822", &(0x7f0000000140)=""/99) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:05 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x3) 00:25:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) 00:25:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r5, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r6, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000840) 00:25:05 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x80, 0x20}, &(0x7f0000000080)=0xc) 00:25:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:05 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x1ff) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x280, 0x8) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) ioctl$DRM_IOCTL_MODE_DIRTYFB(r5, 0xc01864b1, &(0x7f0000000140)={0xcb, 0x2, 0x2, 0x8, &(0x7f0000000100)=[{0x9d, 0x9, 0x8, 0x401}, {0x1, 0x800, 0x81, 0xe638}, {0x3, 0x5, 0x2a32, 0x3}, {0xff, 0x9, 0x401, 0x5}, {0x1, 0x1ff, 0xff80, 0xfffa}, {0x7ad2, 0x7bff, 0xee, 0xff}, {0xfffa, 0x18, 0xba, 0x9}, {0xfe01, 0x9, 0x9, 0x4}]}) fcntl$setlease(r4, 0x400, 0x0) getsockopt$netlink(r4, 0x10e, 0x1, &(0x7f0000000080)=""/57, &(0x7f00000000c0)=0x39) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000004b4860a75e1242e1c48c7217d7e55b0a777d33d196ba3a5fa345564d05f6a86b25406b0162d59333cab4b3e686e2f1adc3d23480c3ae1113a5815ce9e13a27ea382708a77ee6cca042681fad9edef3f5cdede2d7fbdf1ea7fa0e35b416b4f6bf6488fe629c00d91e521745d26d7dc4ae9c03a7a6306dc597f8564354dfaff2698c29d37445875172f8987a8a036b98b6ae92d19b5aa7d86312f0e045d987b49e5852160900000000000000", @ANYRES16=r7, @ANYBLOB="3649728ba7aa3acd7b70742a3b1213675a10d185b0c56522ed4f0e288d53ae19bae88f2df02c173f5bf76e345c5a30937d2fc435afed3665050ae5ecf38037"], 0x14}}, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000125bd7000fcdbdf250f00005350000008000200018000000800020000002000"], 0x34}}, 0x44000000) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) dup3(r2, r3, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) socket$inet_dccp(0x2, 0x6, 0x0) socket$rds(0x15, 0x5, 0x0) 00:25:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r6, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x24000050) 00:25:05 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:05 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) setsockopt$PNPIPE_HANDLE(r5, 0x113, 0x3, &(0x7f0000000040)=0x9, 0x4) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='caif0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x503100, 0x120) 00:25:05 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:06 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 00:25:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) socket$inet_dccp(0x2, 0x6, 0x0) 00:25:06 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000000)={0x2b, 0x3, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x21}}, @enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x2}]}, 0x28) 00:25:06 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:06 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3f, 0xc001) fsetxattr(r1, &(0x7f0000000080)=@random={'user.', '\x00'}, &(0x7f00000000c0)='\x00', 0x1, 0x1) 00:25:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f00000000c0)={0x5, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) 00:25:06 executing program 2: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r4, 0x1, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) 00:25:06 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4000, 0x0) write$sndseq(r0, &(0x7f0000000180)=[{0xf8, 0x2, 0x0, 0xc, @tick=0x9d16, {0x5, 0x9}, {0x6}, @note={0x81, 0x80, 0x81, 0x7, 0x3}}], 0x1c) r1 = socket$rds(0x15, 0x5, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x4) fcntl$setlease(r2, 0x400, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1409, 0x2, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}}, 0x4801) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:06 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0x6, {0x7f, 0x8, 0xfffffffa, 0x2, 0x1, 0x10001}}) 00:25:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:06 executing program 2: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r3 = dup3(r2, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000140)={0x800, 0x0, 0x20000, 0x0, r4}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={r4, 0xf00}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r6, &(0x7f0000000100)=0x4) r7 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r7, 0x400, 0x0) getsockopt$inet_buf(r7, 0x0, 0x10, &(0x7f00000001c0)=""/166, &(0x7f0000000280)=0xa6) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r8, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x4000005) 00:25:06 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r4) setregid(r2, r4) 00:25:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:06 executing program 2: getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x400, 0x2}) r4 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0xfffffd1d, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}, 0x0, 0x4, 0x0, 0xfffd}}, 0x80, 0x0}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x2f, 0x3, 0x1, 0xbf5, 0x22, @empty, @private0={0xfc, 0x0, [], 0x1}, 0x1, 0x7800, 0x9, 0x20d80}}) read$char_usb(r5, &(0x7f0000000280)=""/4096, 0x1000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000001801400020076657468315f7633a1048a0000000000000000000000000000000005"], 0x2c}}, 0x0) 00:25:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:06 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000000)={0x7f, "bce9ae7811305fd29a10e46a4ff775f32783baeca2f187a6ab21a3da00570026", 0x3}) 00:25:06 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:06 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000180)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 1: syz_open_dev$swradio(&(0x7f0000000900)='/dev/swradio#\x00', 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000080)=""/45, 0x2d}], 0x1, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000940)={0x0, 0x4}) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000140)={0x80000001, 0x7, 0x7f}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000180)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:07 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 00:25:07 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x200, 0x0, 0x25dfdbfb, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 00:25:07 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4208040, 0xc4) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) setsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) r4 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r4, 0x400, 0x0) setsockopt$llc_int(r4, 0x10c, 0x8494a6857a9b1d50, &(0x7f0000000040)=0xfff, 0x4) 00:25:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000180)) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r4, 0x227a, &(0x7f0000000200)) r5 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r7, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r8, 0x401) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000040)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r11, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@loopback, 0x77, r11}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000140)={r9, 0x3ff, 0x20, 0x1, 0x7a21}, &(0x7f0000000180)=0x18) 00:25:07 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x0, @rand_addr=0x640100ff}, 0x10, 0x0, 0x33, 0x0, 0x0, 0x24004894}, 0x24044800) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:init_var_run_t:s0\x00', 0x24, 0x1) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x68, 0x2, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x614}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xee}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x81}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x4}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x8814}, 0x280d641cebbb451e) fcntl$getflags(r1, 0x401) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, 0x4, 0x8, 0x501, 0x0, 0x0, {0x2, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x84}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffb}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x600}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0xfffffa5c}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8}, @CTA_TIMEOUT_DCCP_RESPOND={0x8}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0xfde}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0xcc}}, 0x5) socket$kcm(0x29, 0xf, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x8, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x4000850}, 0x40051) 00:25:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000240)="13febb5aceeaf8c4fc18dc76dc71f30fc488c0c338178a23b473536310ee370339dfe25a2868945b72dc538821e8458e27d7f30e97cd0b114ca8ca8b1b737651ca2c8de3d69ec189ff5d14d42d730afc1cb31eb8a588e188519294f11dc2062273f56471d60a7bb1b254ef22f9ddf108eb2085f1a92e02a687689764aaa851a52afa3b4f9acd027dab67fdff4a08a175c2d66fd476079751ebc0641ca7bfeec01f28dfdb2280eaf274150795c71f4375c175e5d263ef97393239c633559885e9") setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:07 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:07 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:07 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x100) fcntl$getflags(r1, 0x401) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000240)={0x1, "ab51faa84a8513418fae1974756ec23c014da5ba6b5c057dd42d443d270ffeeb", 0x2, 0x1}) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000040)={'batadv_slave_1\x00', 0x9}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r3, 0x400, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000200)}, &(0x7f0000000080)=0xfffffffffffffefc) r6 = dup3(r5, r4, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0xffff, 0x8002, 0x0, 0x0, r7}, &(0x7f0000000180)=0x10) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x540) 00:25:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:07 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x401) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x111000) write$P9_RATTACH(r1, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x80, 0x1, 0x1}}, 0x14) socket$rds(0x15, 0x5, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x10, @broadcast}, 0x10, 0x0}, 0x0) 00:25:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:07 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:07 executing program 3: socket$rds(0x15, 0x5, 0x0) socketpair(0x2b, 0x6, 0x7f, &(0x7f0000000000)) 00:25:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:07 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 00:25:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:07 executing program 5: socket$rds(0x15, 0x5, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:07 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f00000000c0)) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1}, 0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r6 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r6, 0x400, 0x0) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000180)={0x0, 0x8, 0x9e, &(0x7f0000000540)="ea6eda57792f50a74104848782c99cf00bcd0f7d5c2ac677dc6556fa19750f9998c32112d4a1171e663d0aba64d04afa66bbe402d6fcc29ef1b20dbcc22f17b730238df548f60a303e91baad3ef67cb13c77485112637ef7fde46f3bfb9d13361ca675e0ff1a44dd41c832a732a078e044952b5bc50641359c48daa854fb5132395cb3f2ea1fd62902b9a1c3bea256fc7eb94656acb975c7bc855a9fd2e9"}) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="7d0800000000708d00d619"], 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="a8020000", @ANYRES16=r5, @ANYBLOB="102cbd7000fbdbdf25060000009400058008000100657468003c000280080003000200000008000400faffffff080003000300000008000200090000000800030000020000080002008100000008000100110000004c000280080004000000000008000400e10e00000800020000000000080004fe05000000080001001b0000000800010003000000080004000700000008000400010000000800030004000000040001800c00078008000100060000004c0003800800010009000000080001000900000008000200ff01000008000200ff0300000800030003000000080003004000000008000200020000000800010002000000080002000900000028000280040004000800020030df09460400040004000400080002000800000004000400040004002400078008000100000000030c0004005c040000000000000c00030005000000000000003800028034000380080002000200000008000100ffffffff0800010000000000080001000100000008000200ff030000080002007f0000000c0003800800020004000000140104800900010073797a30000000000c00078008000200070000004c000780080002000500000008000100060000000800020000000000080001000800000008000300b00000000800020000000000080003000300000008000300fcffffff08000200050000003400078008000100110000000800010010000000080001001000000008000200ffffffff08000300b78400000800010018000000240007800800031c78261176000200000008000300239200000800030005000000080003002b0900000c00078008000400020000000900010073797a30000000001300010062726f6164636173742d6c696e6b00000c00078008000100130000001c00078008000200fdffffff080002000101000008000400e3f0ffff"], 0x2a8}, 0x1, 0x0, 0x0, 0x2000c040}, 0x8000) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000b00000006000000000000398d2ffb2a427d58acb0007665746831167b6c616e000000000000"], 0x2c}}, 0x0) 00:25:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0xa2ec) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:08 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, &(0x7f0000000180)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b000000180001801400020076657468315f766c616e000000000000b44e62c527ac90fa9fd1274b3098286531ef68ab551a79eb58727fff7e1d667faeafef5395158f23b40762151a125df1f1f50686614ffe0ed5a17251b2137e0f7bcc998b224d03f056e9f3a51e362c3fd1742c4b550b0ef1ecc4955420f348"], 0x2c}}, 0x0) 00:25:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) fcntl$setlease(r1, 0x400, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:08 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:08 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000080), 0x800) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100005dd4f79a6b287761e60a77602f000000000000000b020000180001801400020076657468315f766c61c5240000000000"], 0x2c}}, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000140)={0x20}) 00:25:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) connect$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x7, 0x8, 0xb0, "a9006392d27a290b6388c0d24dd46f9e4aa75e273388ba38609024f9959b8ea80c892d9c3937ca89998007b9e0b9781bd1daf00ace4e9a75f21dd5343e2228", 0x30}, 0x60) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:08 executing program 2: socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:08 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:08 executing program 2: socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r5, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r8, 0x20, 0xffffffff, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x20000090) 00:25:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:08 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:08 executing program 2: socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:25:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:25:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000280)={0x2, {{0x2, 0x4e24, @private=0xa010102}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e1ec1) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, 0x0, 0x0) 00:25:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:09 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = io_uring_setup(0x635e, &(0x7f0000000000)) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0xfffffff, 0x9, 0x2, r2, 0x0, &(0x7f00000000c0)={0x990af4, 0x7, [], @p_u16=&(0x7f0000000080)=0x3f}}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000180)=0x10) r7 = dup3(r6, r5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r8}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000140)={r8, @in={{0x2, 0x4e24, @private=0xa010100}}, [0x7, 0xe92f, 0x3, 0xfffffffffffffe01, 0x8, 0x3, 0xfffffffffffff001, 0x6e16, 0x24d2, 0x3, 0x2, 0x67, 0x6, 0x1, 0x7f]}, &(0x7f0000000240)=0x100) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x8000000) syz_io_uring_complete(r9) syz_io_uring_complete(r9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0xfffffffffffffe6f) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=@known='trusted.syz\x00') 00:25:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_MODE_GETGAMMA(r2, 0xc02064a4, &(0x7f0000000180)={0xae6, 0x2, &(0x7f0000000040)=[0xac, 0x2], &(0x7f00000000c0)=[0x5, 0x2], &(0x7f0000000140)=[0x9, 0x8000, 0x2]}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:25:09 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:09 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r3) r4 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000280)="b9cc2039025bd4132b88ea1f86297628e6de1cb7d78c706ebfb42394a6f7354dcb93d120f91cff249ba8013224115a19c9a9fa64c8c4573e2415a9ab8109720f3e5efcd1d2354d32c96e3435ef2636cd192361fdf85eecb253143d858ebe4b9f293a887ac4d684c0c8116beab458bdf973e87ed0c04f240c636ec4fdc60ec93493", 0x81, r3) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000580)="e12a4c0ad028df892b3efdaed3c07c2f9ef1cd99ced8e7e9a2f79dec6ef8ed0dffffffff000000004e2211afc63390139f80b885d464555fe95b37c70f4fc82b64fc67a36bd4f1af8ab332831e1c85e1067121c58fad393d090023377434917e6fbb1e7b3e0f38eed871f91a3e48b25f99762bc2ff0f00000000000027f120faf29047709a0696453218c5f026a2011abf", 0x91, r5) keyctl$instantiate(0xc, r4, &(0x7f0000000140)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', '\\\\{\\'}, 0x1d, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r7, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) ioctl$MON_IOCX_GET(r8, 0x40189206, &(0x7f0000000340)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000640)=""/4096, 0x1000}) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:25:09 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r3, 0x400, 0x0) accept$alg(r3, 0x0, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(r5, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000140)=""/203, 0xcb}], 0x2, 0x0, 0x0, 0x20000000}, 0x20004818) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x3, 0x0, 0x0) 00:25:09 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:09 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8030}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r1}) r3 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT_ANY(r3, 0x0, 0x14, &(0x7f0000000000)=""/190) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000480)=""/214) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) accept$inet6(r2, &(0x7f0000000380), &(0x7f00000003c0)=0x1c) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) r6 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r6, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xc0, r7, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:syslogd_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_1\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bridge_slave_1\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}]}, 0xc0}}, 0x4000000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="7384ecfebc6c8b72d6c008215ebe47ba74a5afb5b0df2acd6b1e6167b2f39d79d8c96b7bd600cc2f0bea537a67b89db9186e63415203d12c3c23e8af8b074bf9acefc8b968ad05b6b66757732566", @ANYRES16=r7, @ANYBLOB="140b27bd7000fddbdf25040000002200070073797374656d5f753a6f626a6563745f723a6465766c6f675f743a73300000000500010000000000050001000000000014000200ff02000000000000000000000000000114000300000000000000000000000000000000002300070073797374656d5f753a6f626a6563745f723a73755f657865635f743a733000000500010000000000"], 0x9c}, 0x1, 0x0, 0x0, 0x90}, 0x84) 00:25:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) 00:25:09 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000001c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc41}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x4000040) 00:25:10 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x1401, 0x20, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {0xb}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) 00:25:10 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:10 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8400, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0xa0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:10 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_proto_private(r3, 0x89ec, &(0x7f0000000280)="675012a2df7154bda03526643de27b5a4b386e33c2d37fe7a9ff7e5791f22a12998ab1bb60a4b7394aefe84f8d619cff4c3b5d0530a382874e7fb0014dec6ad6c7a0a953e032fd8a0b5649ac113d30e8625ac97dcf2e3603dffa6500386af3f98ee3869aacd6494dcf1d18947cdce0b495e2c9303dbdd5a7526372316c86ca93da90") r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000001800017468315f766c616e000000000000"], 0x2c}}, 0x0) 00:25:10 executing program 2: syz_open_dev$swradio(&(0x7f0000000900)='/dev/swradio#\x00', 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000080)=""/45, 0x2d}], 0x1, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000940)={0x0, 0x4}) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:10 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0xffffffffffffff0e) r1 = dup2(r0, r0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) rt_sigpending(&(0x7f0000000000), 0x8) 00:25:10 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:10 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{0x8f13, 0x6ec}, 0x6}, 0x10) 00:25:10 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x3, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000040)={'wg2\x00', r6}) 00:25:10 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 00:25:10 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:25:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:10 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 00:25:10 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) [ 896.273463][T12736] tipc: TX() has been purged, node left! 00:25:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:25:11 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x1a1000, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f00000000c0), 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(0xffffffffffffffff, 0x80044dfb, &(0x7f0000000100)) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x7, 0x8001, 0x8, 0x9, 0x4, 0x10000000}) fcntl$getflags(r2, 0x401) ioctl$sock_qrtr_TIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) 00:25:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x0, 0x6ec}, 0x6}, 0x10) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:25:11 executing program 3: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'gre0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="81727370616e30000000000000000000", @ANYRES32=r0, @ANYBLOB="0080800000000001000000c1420700880006000007049078ac14142c000000014408b66000000800440ca833ac1e010100000002442cb141ac1414aa000004007f0000010000003fffffffff00000000ac14142400000003ac14143d00000fff861d000000000105a39830001250d07985ae62cba223be1e3b359956be009404010000070f6000000000ac1414bb7f0000010000"]}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r4, 0x89f5, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x2f, 0x7e, 0x1, 0x4, 0x8, @local, @private2={0xfc, 0x2, [], 0x1}, 0x7809, 0x7, 0x4ca, 0x1bf}}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmmsg(r6, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) r9 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r9, 0x400, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f0000000780)={'syztnl1\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x4, 0x1f, 0x1, 0x5, 0xa, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0x1, 0x2, 0x101}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000900)={&(0x7f00000007c0)=ANY=[@ANYBLOB="28010000", @ANYRES16=0x0, @ANYBLOB="000127bd7000fcdb00000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300030000001400020073797a5f74756e00000000000000000014000200767863616e31000000000000000000001400020069703667726574617030000000000000340001801400020076657468300000000000000000000000140002006e65747063693000000000000000000008000300010000003400018008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f7465616d0000001400020067656e657665310000000000000000005000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="080003000300000008000100", @ANYRES32=r8, @ANYBLOB="080003000100000008000100", @ANYRES32=r10, @ANYBLOB="140002f66c616373656330000000000000000000"], 0x128}, 0x1, 0x0, 0x0, 0x4009}, 0x44002) socket$phonet_pipe(0x23, 0x5, 0x2) 00:25:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:11 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0xe0, 0x10, 0x25f32caec8b44649, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0x45, 0x0, 0x0, 0x1, [@generic="76a638dc0ffdacad096f8e5bd231646e1deeef2b5a4fc32e1790d016bce9f48c1324336761b070920636092c5c176a268d19e3c14387c45436", @typed={0x8, 0x0, 0x0, 0x0, @uid}]}, @generic="b96f78f6a7eea8424beef26010f71c6624130e762d227476e12fa1911933573696ab7db927a497484774fb6d03f6a8510e7da7e9f3406b39d4e4ec2fd65a55c4974246dce5c23edd54bf67983073474246ea8b4ab4b042a961c0a8a05a954543c5ac39eb776646cb5b6b1b4e7716dddb6b7141abfd00000000"]}, 0xe0}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x80, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x26}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x100c8ab7a5a172f5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, '(&).\\{]\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '}%}\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000814}, 0x8d0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x514, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_DOMAIN={0xa, 0x1, '\'/!.@\x00'}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, ')\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x28000050}, 0x2085) 00:25:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:11 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:11 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:11 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x0, 0x6ec}}, 0x10) 00:25:11 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:12 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) exit_group(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000140)=0x7) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="41cfd398d8b3798f2004138a6f85997f6e6174000000000000000000000000000000000000000000000000000000000039000000550b66b9b3db91a2d09cd69df2ba4e6d65cbca7feebb5314c44b8a836a6c5d795585ada92f3cf5237617ffdc3b6f02835618638f734b6fd41d2604549bf95f406133a0eaac91d58f8013f63dd21419"], &(0x7f00000000c0)=0x5d) socket$rds(0x15, 0x5, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x7d5100, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x3, 0x0, 0xffffffffffffff8f) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_dccp_buf(r5, 0x21, 0xc0, &(0x7f0000000240)="1731a3b8895b7bea20b1cec637220c575fe01c1cdefe64d151da932eccc6cb1c0774dfc7890b3ee4d366e6d8cd3d6d67cebdc12bbea5ef12299a6458f301db3240797513471ef79eefadef6c98e8fbd70ba264e5693f6af1046da89d02fd44db0362373b4908ce32089b98c899c0f29550c1d4b2ccc932e14e9401fa30b1621e85cf5c5c455bb4ccace0bab25c5a4042685dd21a21d5e2e8137541d201b41b4859a3a4fdb6bff7824d485d6c84446d4ca6b16b996db4d90aed14753ed4c5c824296e3626ab7f682cfcd1a39ecfc5f1c52f5b08292baad780911e84cc97a59e5d31b07cb01a9491a871d57bbd0ac552b26e67ae94e3", 0xf5) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') 00:25:12 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:12 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x88800, 0x10a) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x3, 0x0, 0x0) 00:25:12 executing program 1: sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000340)={0x1, 0x100000001, 0x9}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r3, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa04, {{0x6000000, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x0, {0xbc, 0x2, "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", 0x20, 0x7, 0x4, 0xc0, 0x5, 0x3, 0x7f}, r4}}, 0x128) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r5, 0x401) r6 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r6, 0x400, 0x0) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r7, 0x400, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r5, r6, 0x4, 0x2, r7}, 0x14) get_mempolicy(&(0x7f0000000280), &(0x7f00000002c0), 0x9, &(0x7f0000ffc000/0x4000)=nil, 0x1) 00:25:12 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:12 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$CHAR_RAW_BSZGET(r1, 0x80081270, &(0x7f0000000000)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:12 executing program 0: setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:12 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, 0x0, &(0x7f0000000100)) 00:25:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000040)="3475f82b4fa5e9582c7559e3ea5cc50bedfb49171e5674059635236b3f47c5d61deea1ab7c67bb60b368a59cf0e4ccf0267972aa0e02cfd1b0610aaec1f1b9467b19b2e2479a47f321c82a068dc74c96acea07ed3247281bc5ee1dac1f518ddd721b5b59bbc7153834d587c2c7a895a7a6d0fd649520470f13bba727600107f708d65fdc1a180a020f5247f3e84ea1a0d2ec76cd9b0df8c9d3d919f855f938017e56ec49194d3fded3fd0d4aaa6dc1415996e18d2ddfe4ac4e201cf0e9e4348272288ea6d48f8e125c4c0466dc21f7c0de8f900883d5065c6350a1afeb38d36c169fb2aa3867bad52ba42b4262b8853d3b26", 0xf2) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x48004}, 0x1) 00:25:12 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:apt_lock_t:s0\x00', 0x20, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000000)={0xefd5, 0x7}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket$rds(0x15, 0x5, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:13 executing program 0: setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) [ 898.502494][ T28] audit: type=1400 audit(1595723113.040:27): avc: denied { relabelto } for pid=7870 comm="syz-executor.3" name="RDS" dev="sockfs" ino=144400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:apt_lock_t:s0 tclass=socket permissive=1 00:25:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:13 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0x4e24, @multicast1}, 0x10, 0x0}, 0x80) accept4$x25(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000100)) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000480)=0x1, 0x4) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) [ 898.634321][ T28] audit: type=1400 audit(1595723113.120:28): avc: denied { relabelto } for pid=7870 comm="syz-executor.3" name="RDS" dev="sockfs" ino=144407 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:apt_lock_t:s0 tclass=socket permissive=1 00:25:13 executing program 0: setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:13 executing program 3: socket$rds(0x15, 0x5, 0x0) socket$rds(0x15, 0x5, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) sendmsg$rds(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x0, @broadcast}, 0x10, 0x0}, 0x24000000) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) accept(r2, &(0x7f0000000000)=@ethernet={0x0, @random}, &(0x7f0000000080)=0x80) r3 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x3, 0x0, 0x18) r4 = socket$packet(0x11, 0x2, 0x300) r5 = memfd_create(&(0x7f0000000000), 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f0000000140)) 00:25:13 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000841}, 0xc8050) 00:25:13 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:apt_lock_t:s0\x00', 0x20, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = memfd_create(&(0x7f0000000000), 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000000)={0xefd5, 0x7}) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) socket$rds(0x15, 0x5, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:13 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:13 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x101040, 0x20, 0x2}, 0x18) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f00000000c0)=0x3f) r3 = socket$packet(0x11, 0x2, 0x300) r4 = memfd_create(&(0x7f0000000000), 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r5, 0x4c05, &(0x7f0000000100)) 00:25:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:13 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r1}) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x3, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x2000, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:13 executing program 0: socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000080)={{}, 0x6}, 0x10) 00:25:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:13 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) 00:25:13 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_SCHED_SCAN_MATCH={0x28, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x86ae83f}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x1b, 0x1, "8ef56864d8e9cebf9ae64c1bd716221c7c164be04e4bcf"}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xd}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x20014815) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:13 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:14 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:25:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r4 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000080)=""/33, &(0x7f00000000c0)=0x21) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000c88000)={r3, &(0x7f0000847f95), &(0x7f000089b000)}, 0x3a8) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000040)={0xa, 0x0, @private=0xa010102}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x4) 00:25:14 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockname(r0, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) socket(0x10, 0x800, 0x54) r2 = socket$rds(0x15, 0x5, 0x0) socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x4e23, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000014}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x3, 0x0, 0x0) 00:25:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:14 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:25:14 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:14 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x105000, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ext2\x00', 0x904040, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000440)={0xf8, 0x1a, &(0x7f0000000040)="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"}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r2, 0x400, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) 00:25:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:14 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:25:14 executing program 1: socket$rds(0x15, 0x5, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r3, 0x401) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r4, 0x401) r5 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r5, 0x8008f512, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x100) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0xfffffff8}, 0x8) r6 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x1, 0x1000) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0xfffc, @remote}, 0x10, 0x0}, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8, 0x9000, 0x3, 0x7dbf1ef7, 0xef}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000180)={r7, @in6={{0xa, 0x4e23, 0xc0, @dev={0xfe, 0x80, [], 0x13}, 0x1}}}, 0x84) 00:25:14 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) fcntl$dupfd(r1, 0x0, r2) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:14 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x4000) 00:25:14 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080), 0x10) 00:25:14 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) memfd_create(&(0x7f0000000000), 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:14 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) 00:25:14 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = memfd_create(&(0x7f0000000000), 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$vhost_msg_v2(r3, &(0x7f0000001100)={0x2, 0x0, {&(0x7f0000000040)=""/168, 0xa8, &(0x7f0000000100)=""/4096, 0x2, 0x1}}, 0x48) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) sendmmsg(r4, &(0x7f0000001bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x12, 0x0}}], 0x2, 0x0) bind$packet(r1, &(0x7f0000001180)={0x11, 0x9, r6, 0x1, 0x81, 0x6, @local}, 0x14) 00:25:14 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x280, 0x0) 00:25:15 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:15 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:15 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) 00:25:15 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000140)={0x1, 0x2, 0x1000, 0x13, &(0x7f0000000080)="3e8866f24296f7468adf0a1b34bd71b2f5fa3d", 0x41, 0x0, &(0x7f00000000c0)="192b02ffa68da2c2b86bcfd181110ceaf1d468a83e810865fea50374caf1a012fd24ba92b6624fcd8b11e4478757439946f1c2631afad41a417fb476fb2bf83417"}) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="764a72836727742ae489f43715721dd00586ab634b10f75a02db010f1b6dd09b56e33b34cc6c7dd9ebff9286616f0be0a6dcb1f958a289d7f27482111422358231") setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x3, 0x0, 0x0) 00:25:15 executing program 2: socket$rds(0x15, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:15 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:15 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) 00:25:15 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) 00:25:15 executing program 2: socket$rds(0x15, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:15 executing program 5: socket$rds(0x15, 0x5, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:15 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) 00:25:15 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) 00:25:15 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4c4142, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x17) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000080)=r1, 0x1) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) 00:25:15 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:15 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000007e00)={&(0x7f0000004cc0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000004dc0)=[{&(0x7f0000004d00)=""/13, 0xd}, {&(0x7f0000004d40)=""/78, 0x4e}], 0x2, &(0x7f0000007bc0)=[@rdma_dest={0x18, 0x114, 0x2, {0x7fff, 0x7}}, @rdma_args={0x48, 0x114, 0x1, {{0x3f, 0xfffffffe}, {&(0x7f0000004e00)=""/131, 0x83}, &(0x7f0000007280)=[{&(0x7f0000004ec0)=""/163, 0xa3}, {&(0x7f0000004f80)=""/74, 0x4a}, {&(0x7f0000005000)=""/181, 0xb5}, {&(0x7f00000050c0)=""/29, 0x1d}, {&(0x7f0000005100)=""/4096, 0x1000}, {&(0x7f0000006100)=""/4096, 0x1000}, {&(0x7f0000007100)=""/184, 0xb8}, {&(0x7f00000071c0)=""/190, 0xbe}], 0x8, 0x2, 0xb50b}}, @cswp={0x58, 0x114, 0x7, {{0x4, 0x1}, &(0x7f0000007300)=0x1, &(0x7f0000007340)=0x6, 0x5, 0xfffffffffffffc00, 0x8, 0x7fff, 0x1, 0xcdd}}, @mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x8}, &(0x7f0000007380)=0x1, &(0x7f00000073c0)=0x6c, 0x8, 0x9, 0x6, 0xffffffffffffc532, 0x22, 0x4}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0x6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000007400)=""/240, 0xf0}, &(0x7f0000007500), 0xa}}, @cswp={0x58, 0x114, 0x7, {{0x3ff, 0x20}, &(0x7f0000007540), &(0x7f0000007580)=0x101, 0x8, 0x100, 0x89, 0x4, 0x44, 0xfffffffffffffeff}}, @rdma_args={0x48, 0x114, 0x1, {{0xf, 0x4}, {&(0x7f00000075c0)=""/191, 0xbf}, &(0x7f0000007b40)=[{&(0x7f0000007680)=""/137, 0x89}, {&(0x7f0000007740)=""/146, 0x92}, {&(0x7f0000007800)=""/241, 0xf1}, {&(0x7f0000007900)=""/200, 0xc8}, {&(0x7f0000007a00)=""/210, 0xd2}, {&(0x7f0000007b00)=""/23, 0x17}], 0x6, 0x1a}}, @rdma_dest={0x18, 0x114, 0x2, {0x100, 0x6}}], 0x210, 0x44001}, 0x400c004) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/155, 0x9b}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000001180)=""/5, 0x5}, {&(0x7f00000011c0)=""/80, 0x50}, {&(0x7f0000001240)=""/155, 0x9b}], 0x7, &(0x7f0000001380)=""/141, 0x8d}, 0xff}, {{&(0x7f0000001440)=@alg, 0x80, &(0x7f00000015c0)=[{&(0x7f00000014c0)=""/6, 0x6}, {&(0x7f0000001500)=""/79, 0x4f}, {&(0x7f0000001580)=""/20, 0x14}], 0x3, &(0x7f0000003640)=""/4096, 0x1000}}, {{&(0x7f0000004640)=@vsock, 0x80, &(0x7f0000004880)=[{&(0x7f00000046c0)=""/44, 0x2c}, {&(0x7f0000004700)=""/200, 0xc8}, {&(0x7f0000004800)=""/99, 0x63}], 0x3, &(0x7f00000048c0)=""/48, 0x30}, 0x72}, {{&(0x7f0000004900)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004980)=""/211, 0xd3}, {&(0x7f0000004a80)=""/83, 0x53}], 0x2, &(0x7f0000004b40)=""/83, 0x53}, 0x81}], 0x4, 0x0, 0x0) 00:25:15 executing program 2: socket$rds(0x15, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:15 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) socket$rds(0x15, 0x5, 0x0) 00:25:15 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:15 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) 00:25:16 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f0000000340)={@null=' \x00', 0x8, 'netpci0\x00'}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SOCKET_OWNER]}, 0x1c}}, 0x0) dup(r1) r6 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7d, 0x88000) socket$kcm(0x10, 0x2, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x8, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x58, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_EXT_CAPABILITY={0x44, 0xac, "b9641532a6005ba71b90e8c569876f844542c39bbf8fc8828001a3daf6506b0d715818f00689fbea8799194c3516b06d3d5c249091ecaac70c8b9c7cf24371ca"}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x80) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r8, 0x400, 0x0) ioctl$NBD_CLEAR_SOCK(r8, 0xab04) 00:25:16 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:16 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) 00:25:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) [ 901.638908][ T8058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 901.716093][ T8061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:16 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:16 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) 00:25:16 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x3, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x102) fcntl$setlease(r1, 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000080)={{0x1d}, {0x81, 0x41}, 0xfff, 0x5, 0x80}) lookup_dcookie(0x8, &(0x7f0000000240)=""/31, 0x1f) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getown(r2, 0x9) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x800) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10802, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xc402, 0x80400) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000140)=0x9) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000040)=0x4, 0x4) 00:25:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:16 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) 00:25:16 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000100)={0xa, 0x0, @remote}, 0x10, 0x0, 0x0, 0x0, 0xffffff7c}, 0x80) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x15, 0x0) syz_open_procfs(r2, &(0x7f00000000c0)='net/sockstat6\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 00:25:16 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa2f5fd, 0xa38006}, 0x7}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:16 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) 00:25:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, &(0x7f0000000100)) 00:25:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:17 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2208000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_loose='cache=loose'}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}], [{@dont_hash='dont_hash'}, {@appraise='appraise'}]}}) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0xa, 0x0, @remote}, 0x34, 0x0}, 0x0) 00:25:17 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, 0x0) 00:25:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rseq(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/netfilter\x00') 00:25:17 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 00:25:17 executing program 0: socket$rds(0x15, 0x5, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={[], 0x12}}, 0x8) [ 902.607100][ T9593] ------------[ cut here ]------------ [ 902.622808][ T9593] WARNING: CPU: 0 PID: 9593 at fs/read_write.c:517 __kernel_write+0x427/0x500 [ 902.659653][ T9593] Kernel panic - not syncing: panic_on_warn set ... [ 902.666282][ T9593] CPU: 0 PID: 9593 Comm: kworker/0:6 Not tainted 5.8.0-rc6-syzkaller #0 [ 902.674603][ T9593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.684727][ T9593] Workqueue: events p9_write_work [ 902.689761][ T9593] Call Trace: [ 902.693565][ T9593] dump_stack+0x18f/0x20d [ 902.697911][ T9593] panic+0x2e3/0x75c [ 902.701813][ T9593] ? __warn_printk+0xf3/0xf3 [ 902.706410][ T9593] ? printk+0xba/0xed [ 902.710392][ T9593] ? log_store.cold+0x16/0x16 [ 902.715071][ T9593] ? __warn.cold+0x5/0x45 [ 902.719402][ T9593] ? __warn+0xd6/0x1f2 [ 902.723476][ T9593] ? __kernel_write+0x427/0x500 [ 902.728328][ T9593] __warn.cold+0x20/0x45 [ 902.732570][ T9593] ? __kernel_write+0x427/0x500 [ 902.737423][ T9593] report_bug+0x1bd/0x210 [ 902.741759][ T9593] handle_bug+0x38/0x90 [ 902.745920][ T9593] exc_invalid_op+0x13/0x40 [ 902.750429][ T9593] asm_exc_invalid_op+0x12/0x20 [ 902.755281][ T9593] RIP: 0010:__kernel_write+0x427/0x500 [ 902.760741][ T9593] Code: fd ff ff e8 7b 07 b6 ff 45 31 c9 45 31 c0 b9 01 00 00 00 4c 89 f2 89 ee 4c 89 ef e8 23 18 12 00 e9 35 ff ff ff e8 59 07 b6 ff <0f> 0b 49 c7 c4 f7 ff ff ff e9 00 fe ff ff 4c 89 f7 e8 23 6c f5 ff [ 902.780356][ T9593] RSP: 0018:ffffc90017dffc20 EFLAGS: 00010293 [ 902.786421][ T9593] RAX: 0000000000000000 RBX: ffff8880995c3300 RCX: ffffffff81bdb178 [ 902.794390][ T9593] RDX: ffff888061860000 RSI: ffffffff81bdb537 RDI: 0000000000000005 [ 902.802363][ T9593] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffff8c7138df [ 902.810337][ T9593] R10: 0000000000000000 R11: 1ffffffff1844544 R12: 0000000000000013 [ 902.818395][ T9593] R13: ffff8880995c3418 R14: ffff8880995c3384 R15: 00000000000a800d [ 902.826385][ T9593] ? __kernel_write+0x68/0x500 [ 902.831157][ T9593] ? __kernel_write+0x427/0x500 [ 902.836023][ T9593] kernel_write+0xe2/0x200 [ 902.840445][ T9593] p9_write_work+0x25e/0xca0 [ 902.845048][ T9593] process_one_work+0x94c/0x1670 [ 902.849997][ T9593] ? lock_release+0x8d0/0x8d0 [ 902.854684][ T9593] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 902.860064][ T9593] ? rwlock_bug.part.0+0x90/0x90 [ 902.865003][ T9593] ? lockdep_hardirqs_off+0x66/0xa0 [ 902.870207][ T9593] worker_thread+0x64c/0x1120 [ 902.874896][ T9593] ? process_one_work+0x1670/0x1670 [ 902.880098][ T9593] kthread+0x3b5/0x4a0 [ 902.884166][ T9593] ? __kthread_bind_mask+0xc0/0xc0 [ 902.889274][ T9593] ? __kthread_bind_mask+0xc0/0xc0 [ 902.894388][ T9593] ret_from_fork+0x1f/0x30 [ 902.900346][ T9593] Kernel Offset: disabled [ 902.904820][ T9593] Rebooting in 86400 seconds..