ffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) 11:10:07 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) 11:10:07 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 11:10:07 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:07 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:07 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) 11:10:07 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"18d9ebf167bc73b0ada8d9ab85f4d50d43717fc3d7d7e386babb2b52df05963c5dfee157177b5cc0bf47790071a90aa76e8489b1984f9f434211cb6a19cbb1827d6a17ff6ee1cb5fc4f70ff0d15fa8aa566b5332c2a03b6d41f0e84845a057cffb865bfb5d9daf1f5ca8c7a332a49dd454b28341a87510e540dc793c3f986a51538b61cc591bfedc46744414be3c53e199c0ec3d28eca9c02b55c5d49c667f559d5d6d3982c78cc2a836022ee9ddea9b57a10a50b94babe9b07de287d7a0e59574a898ac377a98bc4689c0aea2789e5f3a5159bf4b36ad68134f6fff78f16afb110add69639879a94d1c7ad4704afc0c8aa02d5645e5e0285ddd7dc01c181bc401b6ea9ac102a79f4ddc6a594e8df1c0e41bccd3d4efb61fc948e6dedb87bbe0a2c8a4f4f8c7af5dcc58e8e46d1783f1bad0f389f507b1fda75016421c3c548288768e11077a9b0c39f4be512c1de20b340fdff143a1132db59cc8fa6c4d953d331599367cc3dbbbc11149c491c9e2d931c0bdc9309972cbc9eaff0fe84ffd5480ac3f29aaa9bef31d12b5e142d8e5f99bb7ac774fd3807490812d7d1efdf7f2004418a2bb0c49aeabb8bba1fac9bc90aa2320cf165221eca38583cd985c029a3b004612322d12f0254b6d48c0cc3adde280e1f65598af5833f887de7cfd69121ad294d0e7233f2b1f9fe1711cd2d6efb43f68b3925b11da587d0fc761d2100025919c3e10ddc8d348fcf51732eef852743640f51528823a1455d18537f6daf7b5bb384f779ccb489e8104645e9ddb2b7751c20f5d40db317354eb57d645b4127f0de9cd9aad6f77316e9ee9f8783f61c2b638d4572e9735024cc7fe84ace1fae51f0046adb651c0d68e484eee415bd8aeb2d8700e5f499576ec6328c927063fd71317d5448d5a321343ea71b8f3f66bd80a5ed77949ed0105e87ccfacf35a6263b3b71b581a33446ba072ffddc6a74d5e5476db43f7798a9e940000415198b716051f7d6dc6717e956a29b5713531574dbf42ef87421253cd9e88ace12b1d8e69434c3a115375f6cd780d451bcfdf03d2060fbdbc90e46a80e4747ed89b27734c2278eb7a1e1dba115babf9a54b6d67a230e1558abcc778502b83cdb818836cfb0de37770ade4c8c3d50473fed65514480f7b84852405df980e817c56c899ec3655bb25a8d6e9294eed285ba2d2523eb3ac632eb27ad6cd55ae2ebb02143d4117ad50fad6fecee5126da6168c756cc516b1f3d53664d61b09bc6d24d5aa22fea152a7d038bebc16ee5fd1d1404d19c00fcb9c0ddcf68a01832a8507ad0c757fe2661c6552145526f5c33aa9ec8fff8f7143a4fbbc6c47e8e1339ade4c7204da62f78bf29e1eb23b9be75992ca232bc978d4cf4f16e0913b68957912056f8ab2048ce9ec99463630658380cb85c624b94615ba9c0e91c70577faf52b4212c2df"}) 11:10:07 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) 11:10:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) 11:10:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) 11:10:07 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"18d9ebf167bc73b0ada8d9ab85f4d50d43717fc3d7d7e386babb2b52df05963c5dfee157177b5cc0bf47790071a90aa76e8489b1984f9f434211cb6a19cbb1827d6a17ff6ee1cb5fc4f70ff0d15fa8aa566b5332c2a03b6d41f0e84845a057cffb865bfb5d9daf1f5ca8c7a332a49dd454b28341a87510e540dc793c3f986a51538b61cc591bfedc46744414be3c53e199c0ec3d28eca9c02b55c5d49c667f559d5d6d3982c78cc2a836022ee9ddea9b57a10a50b94babe9b07de287d7a0e59574a898ac377a98bc4689c0aea2789e5f3a5159bf4b36ad68134f6fff78f16afb110add69639879a94d1c7ad4704afc0c8aa02d5645e5e0285ddd7dc01c181bc401b6ea9ac102a79f4ddc6a594e8df1c0e41bccd3d4efb61fc948e6dedb87bbe0a2c8a4f4f8c7af5dcc58e8e46d1783f1bad0f389f507b1fda75016421c3c548288768e11077a9b0c39f4be512c1de20b340fdff143a1132db59cc8fa6c4d953d331599367cc3dbbbc11149c491c9e2d931c0bdc9309972cbc9eaff0fe84ffd5480ac3f29aaa9bef31d12b5e142d8e5f99bb7ac774fd3807490812d7d1efdf7f2004418a2bb0c49aeabb8bba1fac9bc90aa2320cf165221eca38583cd985c029a3b004612322d12f0254b6d48c0cc3adde280e1f65598af5833f887de7cfd69121ad294d0e7233f2b1f9fe1711cd2d6efb43f68b3925b11da587d0fc761d2100025919c3e10ddc8d348fcf51732eef852743640f51528823a1455d18537f6daf7b5bb384f779ccb489e8104645e9ddb2b7751c20f5d40db317354eb57d645b4127f0de9cd9aad6f77316e9ee9f8783f61c2b638d4572e9735024cc7fe84ace1fae51f0046adb651c0d68e484eee415bd8aeb2d8700e5f499576ec6328c927063fd71317d5448d5a321343ea71b8f3f66bd80a5ed77949ed0105e87ccfacf35a6263b3b71b581a33446ba072ffddc6a74d5e5476db43f7798a9e940000415198b716051f7d6dc6717e956a29b5713531574dbf42ef87421253cd9e88ace12b1d8e69434c3a115375f6cd780d451bcfdf03d2060fbdbc90e46a80e4747ed89b27734c2278eb7a1e1dba115babf9a54b6d67a230e1558abcc778502b83cdb818836cfb0de37770ade4c8c3d50473fed65514480f7b84852405df980e817c56c899ec3655bb25a8d6e9294eed285ba2d2523eb3ac632eb27ad6cd55ae2ebb02143d4117ad50fad6fecee5126da6168c756cc516b1f3d53664d61b09bc6d24d5aa22fea152a7d038bebc16ee5fd1d1404d19c00fcb9c0ddcf68a01832a8507ad0c757fe2661c6552145526f5c33aa9ec8fff8f7143a4fbbc6c47e8e1339ade4c7204da62f78bf29e1eb23b9be75992ca232bc978d4cf4f16e0913b68957912056f8ab2048ce9ec99463630658380cb85c624b94615ba9c0e91c70577faf52b4212c2df"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 11:10:07 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:07 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) 11:10:07 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 11:10:07 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) 11:10:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) 11:10:07 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:07 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:07 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"18d9ebf167bc73b0ada8d9ab85f4d50d43717fc3d7d7e386babb2b52df05963c5dfee157177b5cc0bf47790071a90aa76e8489b1984f9f434211cb6a19cbb1827d6a17ff6ee1cb5fc4f70ff0d15fa8aa566b5332c2a03b6d41f0e84845a057cffb865bfb5d9daf1f5ca8c7a332a49dd454b28341a87510e540dc793c3f986a51538b61cc591bfedc46744414be3c53e199c0ec3d28eca9c02b55c5d49c667f559d5d6d3982c78cc2a836022ee9ddea9b57a10a50b94babe9b07de287d7a0e59574a898ac377a98bc4689c0aea2789e5f3a5159bf4b36ad68134f6fff78f16afb110add69639879a94d1c7ad4704afc0c8aa02d5645e5e0285ddd7dc01c181bc401b6ea9ac102a79f4ddc6a594e8df1c0e41bccd3d4efb61fc948e6dedb87bbe0a2c8a4f4f8c7af5dcc58e8e46d1783f1bad0f389f507b1fda75016421c3c548288768e11077a9b0c39f4be512c1de20b340fdff143a1132db59cc8fa6c4d953d331599367cc3dbbbc11149c491c9e2d931c0bdc9309972cbc9eaff0fe84ffd5480ac3f29aaa9bef31d12b5e142d8e5f99bb7ac774fd3807490812d7d1efdf7f2004418a2bb0c49aeabb8bba1fac9bc90aa2320cf165221eca38583cd985c029a3b004612322d12f0254b6d48c0cc3adde280e1f65598af5833f887de7cfd69121ad294d0e7233f2b1f9fe1711cd2d6efb43f68b3925b11da587d0fc761d2100025919c3e10ddc8d348fcf51732eef852743640f51528823a1455d18537f6daf7b5bb384f779ccb489e8104645e9ddb2b7751c20f5d40db317354eb57d645b4127f0de9cd9aad6f77316e9ee9f8783f61c2b638d4572e9735024cc7fe84ace1fae51f0046adb651c0d68e484eee415bd8aeb2d8700e5f499576ec6328c927063fd71317d5448d5a321343ea71b8f3f66bd80a5ed77949ed0105e87ccfacf35a6263b3b71b581a33446ba072ffddc6a74d5e5476db43f7798a9e940000415198b716051f7d6dc6717e956a29b5713531574dbf42ef87421253cd9e88ace12b1d8e69434c3a115375f6cd780d451bcfdf03d2060fbdbc90e46a80e4747ed89b27734c2278eb7a1e1dba115babf9a54b6d67a230e1558abcc778502b83cdb818836cfb0de37770ade4c8c3d50473fed65514480f7b84852405df980e817c56c899ec3655bb25a8d6e9294eed285ba2d2523eb3ac632eb27ad6cd55ae2ebb02143d4117ad50fad6fecee5126da6168c756cc516b1f3d53664d61b09bc6d24d5aa22fea152a7d038bebc16ee5fd1d1404d19c00fcb9c0ddcf68a01832a8507ad0c757fe2661c6552145526f5c33aa9ec8fff8f7143a4fbbc6c47e8e1339ade4c7204da62f78bf29e1eb23b9be75992ca232bc978d4cf4f16e0913b68957912056f8ab2048ce9ec99463630658380cb85c624b94615ba9c0e91c70577faf52b4212c2df"}) 11:10:08 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) 11:10:08 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 11:10:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 11:10:08 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:08 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) 11:10:08 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) 11:10:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:08 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r2 = epoll_create(0x67) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r2, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) 11:10:08 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) 11:10:08 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) 11:10:08 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)) epoll_create(0x67) 11:10:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) openat$nci(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) 11:10:08 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) openat$nci(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) 11:10:08 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r5, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') getsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:08 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) 11:10:08 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180), &(0x7f00000001c0)) epoll_create(0x67) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) epoll_create(0x67) 11:10:08 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180), &(0x7f00000001c0)) epoll_create(0x67) 11:10:08 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) 11:10:08 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) 11:10:08 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"18d9ebf167bc73b0ada8d9ab85f4d50d43717fc3d7d7e386babb2b52df05963c5dfee157177b5cc0bf47790071a90aa76e8489b1984f9f434211cb6a19cbb1827d6a17ff6ee1cb5fc4f70ff0d15fa8aa566b5332c2a03b6d41f0e84845a057cffb865bfb5d9daf1f5ca8c7a332a49dd454b28341a87510e540dc793c3f986a51538b61cc591bfedc46744414be3c53e199c0ec3d28eca9c02b55c5d49c667f559d5d6d3982c78cc2a836022ee9ddea9b57a10a50b94babe9b07de287d7a0e59574a898ac377a98bc4689c0aea2789e5f3a5159bf4b36ad68134f6fff78f16afb110add69639879a94d1c7ad4704afc0c8aa02d5645e5e0285ddd7dc01c181bc401b6ea9ac102a79f4ddc6a594e8df1c0e41bccd3d4efb61fc948e6dedb87bbe0a2c8a4f4f8c7af5dcc58e8e46d1783f1bad0f389f507b1fda75016421c3c548288768e11077a9b0c39f4be512c1de20b340fdff143a1132db59cc8fa6c4d953d331599367cc3dbbbc11149c491c9e2d931c0bdc9309972cbc9eaff0fe84ffd5480ac3f29aaa9bef31d12b5e142d8e5f99bb7ac774fd3807490812d7d1efdf7f2004418a2bb0c49aeabb8bba1fac9bc90aa2320cf165221eca38583cd985c029a3b004612322d12f0254b6d48c0cc3adde280e1f65598af5833f887de7cfd69121ad294d0e7233f2b1f9fe1711cd2d6efb43f68b3925b11da587d0fc761d2100025919c3e10ddc8d348fcf51732eef852743640f51528823a1455d18537f6daf7b5bb384f779ccb489e8104645e9ddb2b7751c20f5d40db317354eb57d645b4127f0de9cd9aad6f77316e9ee9f8783f61c2b638d4572e9735024cc7fe84ace1fae51f0046adb651c0d68e484eee415bd8aeb2d8700e5f499576ec6328c927063fd71317d5448d5a321343ea71b8f3f66bd80a5ed77949ed0105e87ccfacf35a6263b3b71b581a33446ba072ffddc6a74d5e5476db43f7798a9e940000415198b716051f7d6dc6717e956a29b5713531574dbf42ef87421253cd9e88ace12b1d8e69434c3a115375f6cd780d451bcfdf03d2060fbdbc90e46a80e4747ed89b27734c2278eb7a1e1dba115babf9a54b6d67a230e1558abcc778502b83cdb818836cfb0de37770ade4c8c3d50473fed65514480f7b84852405df980e817c56c899ec3655bb25a8d6e9294eed285ba2d2523eb3ac632eb27ad6cd55ae2ebb02143d4117ad50fad6fecee5126da6168c756cc516b1f3d53664d61b09bc6d24d5aa22fea152a7d038bebc16ee5fd1d1404d19c00fcb9c0ddcf68a01832a8507ad0c757fe2661c6552145526f5c33aa9ec8fff8f7143a4fbbc6c47e8e1339ade4c7204da62f78bf29e1eb23b9be75992ca232bc978d4cf4f16e0913b68957912056f8ab2048ce9ec99463630658380cb85c624b94615ba9c0e91c70577faf52b4212c2df"}) 11:10:08 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) 11:10:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:08 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) epoll_create(0x67) 11:10:09 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) openat$nci(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) 11:10:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) epoll_create(0x67) 11:10:09 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) openat$nci(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) 11:10:09 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"18d9ebf167bc73b0ada8d9ab85f4d50d43717fc3d7d7e386babb2b52df05963c5dfee157177b5cc0bf47790071a90aa76e8489b1984f9f434211cb6a19cbb1827d6a17ff6ee1cb5fc4f70ff0d15fa8aa566b5332c2a03b6d41f0e84845a057cffb865bfb5d9daf1f5ca8c7a332a49dd454b28341a87510e540dc793c3f986a51538b61cc591bfedc46744414be3c53e199c0ec3d28eca9c02b55c5d49c667f559d5d6d3982c78cc2a836022ee9ddea9b57a10a50b94babe9b07de287d7a0e59574a898ac377a98bc4689c0aea2789e5f3a5159bf4b36ad68134f6fff78f16afb110add69639879a94d1c7ad4704afc0c8aa02d5645e5e0285ddd7dc01c181bc401b6ea9ac102a79f4ddc6a594e8df1c0e41bccd3d4efb61fc948e6dedb87bbe0a2c8a4f4f8c7af5dcc58e8e46d1783f1bad0f389f507b1fda75016421c3c548288768e11077a9b0c39f4be512c1de20b340fdff143a1132db59cc8fa6c4d953d331599367cc3dbbbc11149c491c9e2d931c0bdc9309972cbc9eaff0fe84ffd5480ac3f29aaa9bef31d12b5e142d8e5f99bb7ac774fd3807490812d7d1efdf7f2004418a2bb0c49aeabb8bba1fac9bc90aa2320cf165221eca38583cd985c029a3b004612322d12f0254b6d48c0cc3adde280e1f65598af5833f887de7cfd69121ad294d0e7233f2b1f9fe1711cd2d6efb43f68b3925b11da587d0fc761d2100025919c3e10ddc8d348fcf51732eef852743640f51528823a1455d18537f6daf7b5bb384f779ccb489e8104645e9ddb2b7751c20f5d40db317354eb57d645b4127f0de9cd9aad6f77316e9ee9f8783f61c2b638d4572e9735024cc7fe84ace1fae51f0046adb651c0d68e484eee415bd8aeb2d8700e5f499576ec6328c927063fd71317d5448d5a321343ea71b8f3f66bd80a5ed77949ed0105e87ccfacf35a6263b3b71b581a33446ba072ffddc6a74d5e5476db43f7798a9e940000415198b716051f7d6dc6717e956a29b5713531574dbf42ef87421253cd9e88ace12b1d8e69434c3a115375f6cd780d451bcfdf03d2060fbdbc90e46a80e4747ed89b27734c2278eb7a1e1dba115babf9a54b6d67a230e1558abcc778502b83cdb818836cfb0de37770ade4c8c3d50473fed65514480f7b84852405df980e817c56c899ec3655bb25a8d6e9294eed285ba2d2523eb3ac632eb27ad6cd55ae2ebb02143d4117ad50fad6fecee5126da6168c756cc516b1f3d53664d61b09bc6d24d5aa22fea152a7d038bebc16ee5fd1d1404d19c00fcb9c0ddcf68a01832a8507ad0c757fe2661c6552145526f5c33aa9ec8fff8f7143a4fbbc6c47e8e1339ade4c7204da62f78bf29e1eb23b9be75992ca232bc978d4cf4f16e0913b68957912056f8ab2048ce9ec99463630658380cb85c624b94615ba9c0e91c70577faf52b4212c2df"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:09 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) 11:10:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) epoll_create(0x67) 11:10:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) epoll_create(0x67) 11:10:09 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) prctl$PR_SET_FPEMU(0xa, 0x5) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x1, 0x7, 0xa6}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) r0 = syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x35c0, 0x400, 0x2, 0x367}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x9fec, 0x1, 0x2, 0x10b}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) r3 = epoll_create(0x67) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x27, 0x0, r3, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}) r4 = syz_io_uring_setup(0x1024, &(0x7f0000000340)={0x0, 0x2928, 0x2, 0x3, 0x176, 0x0, r0}, &(0x7f00000003c0), &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) io_uring_setup(0x38b9, &(0x7f0000000440)={0x0, 0xd788, 0x80, 0x1, 0x34f, 0x0, r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = syz_open_dev$rtc(&(0x7f0000000540), 0x8b0, 0x201) ioctl$RTC_PIE_OFF(r6, 0x7006) socketpair(0x1f, 0x80000, 0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000005c0), 0x4) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000600)='\'\x00') ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000640)={'\x00', 0x1, 0x7, 0x8, 0x0, 0x8, 0x1, 0x0, '\x00', 0x81}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000b80), 0x1, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000c00)}}, 0x18) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000c80)={"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"}) getsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000001080), &(0x7f00000010c0)=0x4) r9 = openat$nci(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r9, 0x0, &(0x7f0000001140)) 11:10:09 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101580, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_RENAMEAT={0x23, 0xa, 0x0, r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', r1, 0x0, 0x1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x2f, 0x40, 0x1, 0x0, 0x2, @loopback, @private0, 0x40, 0x7800, 0x1, 0x2}}) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040044}, 0x20000800) ioctl$SIOCGETVIFCNT(r1, 0x89e0, &(0x7f0000000440)) ioctl$SIOCGETSGCNT(r4, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f00000004c0)={0x9, 0x9, 0x8000000000000000}) recvfrom$l2tp6(r3, &(0x7f0000000500)=""/69, 0x45, 0x10020, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, 0x20) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0), 0x80000, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', r2, 0x2f, 0xab, 0x2, 0x7fff, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x14}, 0x80, 0x1, 0x815}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000740)={'ip6gre0\x00', &(0x7f00000006c0)={'syztnl1\x00', r7, 0x29, 0x0, 0x4, 0xffffffff, 0x9, @mcast1, @loopback, 0x40, 0x8000, 0x88, 0x5}}) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000780)={0x1, 0x0, {0x26, 0x1b, 0x10, 0xa, 0x1, 0x3f, 0x3, 0x29, 0xffffffffffffffff}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pselect6(0x40, &(0x7f00000007c0)={0x10bf, 0xffffffff, 0x0, 0x6, 0x1f, 0x8, 0x1000, 0x30f92001}, &(0x7f0000000800)={0x6, 0x4, 0x7fffffff, 0x3, 0x7, 0x8, 0xe0000, 0x5}, &(0x7f0000000840)={0x7, 0x8, 0x2, 0x6, 0x1, 0x25, 0x6, 0x9}, &(0x7f0000000880)={0x77359400}, &(0x7f0000000900)={&(0x7f00000008c0)={[0x1]}, 0x8}) recvfrom$l2tp6(r4, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r8 = socket$l2tp6(0xa, 0x2, 0x73) getpeername$l2tp6(r8, &(0x7f0000000a40)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000a80)=0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r9, 0x4008ae8a, &(0x7f0000000b00)={0x2, 0x0, [{0xc0000001, 0x8, 0x8dad, 0xacb2, 0x2}, {0x80000000, 0x80000001, 0x80, 0x200, 0x9}]}) socket$inet_udplite(0x2, 0x2, 0x88) r10 = socket(0x25, 0x80000, 0x5) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r9) sendmsg$L2TP_CMD_TUNNEL_DELETE(r10, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r11, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$SIOCGETVIFCNT(r10, 0x89e0, &(0x7f0000000c80)={0x1}) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x800}]}, 0x28}, 0x1, 0x0, 0x0, 0x8004800}, 0x4) 11:10:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) epoll_create(0x67) 11:10:09 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101580, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_RENAMEAT={0x23, 0xa, 0x0, r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', r1, 0x0, 0x1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x2f, 0x40, 0x1, 0x0, 0x2, @loopback, @private0, 0x40, 0x7800, 0x1, 0x2}}) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040044}, 0x20000800) ioctl$SIOCGETVIFCNT(r1, 0x89e0, &(0x7f0000000440)) ioctl$SIOCGETSGCNT(r4, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f00000004c0)={0x9, 0x9, 0x8000000000000000}) recvfrom$l2tp6(r3, &(0x7f0000000500)=""/69, 0x45, 0x10020, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, 0x20) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0), 0x80000, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', r2, 0x2f, 0xab, 0x2, 0x7fff, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x14}, 0x80, 0x1, 0x815}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000740)={'ip6gre0\x00', &(0x7f00000006c0)={'syztnl1\x00', r7, 0x29, 0x0, 0x4, 0xffffffff, 0x9, @mcast1, @loopback, 0x40, 0x8000, 0x88, 0x5}}) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000780)={0x1, 0x0, {0x26, 0x1b, 0x10, 0xa, 0x1, 0x3f, 0x3, 0x29, 0xffffffffffffffff}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pselect6(0x40, &(0x7f00000007c0)={0x10bf, 0xffffffff, 0x0, 0x6, 0x1f, 0x8, 0x1000, 0x30f92001}, &(0x7f0000000800)={0x6, 0x4, 0x7fffffff, 0x3, 0x7, 0x8, 0xe0000, 0x5}, &(0x7f0000000840)={0x7, 0x8, 0x2, 0x6, 0x1, 0x25, 0x6, 0x9}, &(0x7f0000000880)={0x77359400}, &(0x7f0000000900)={&(0x7f00000008c0)={[0x1]}, 0x8}) recvfrom$l2tp6(r4, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r8 = socket$l2tp6(0xa, 0x2, 0x73) getpeername$l2tp6(r8, &(0x7f0000000a40)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000a80)=0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r9, 0x4008ae8a, &(0x7f0000000b00)={0x2, 0x0, [{0xc0000001, 0x8, 0x8dad, 0xacb2, 0x2}, {0x80000000, 0x80000001, 0x80, 0x200, 0x9}]}) socket$inet_udplite(0x2, 0x2, 0x88) r10 = socket(0x25, 0x80000, 0x5) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r9) sendmsg$L2TP_CMD_TUNNEL_DELETE(r10, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r11, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$SIOCGETVIFCNT(r10, 0x89e0, &(0x7f0000000c80)={0x1}) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x800}]}, 0x28}, 0x1, 0x0, 0x0, 0x8004800}, 0x4) 11:10:09 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101580, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_RENAMEAT={0x23, 0xa, 0x0, r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', r1, 0x0, 0x1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x2f, 0x40, 0x1, 0x0, 0x2, @loopback, @private0, 0x40, 0x7800, 0x1, 0x2}}) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040044}, 0x20000800) ioctl$SIOCGETVIFCNT(r1, 0x89e0, &(0x7f0000000440)) ioctl$SIOCGETSGCNT(r4, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r5 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f00000004c0)={0x9, 0x9, 0x8000000000000000}) recvfrom$l2tp6(r3, &(0x7f0000000500)=""/69, 0x45, 0x10020, &(0x7f0000000580)={0xa, 0x0, 0x0, @dev}, 0x20) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0), 0x80000, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', r2, 0x2f, 0xab, 0x2, 0x7fff, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x14}, 0x80, 0x1, 0x815}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000740)={'ip6gre0\x00', &(0x7f00000006c0)={'syztnl1\x00', r7, 0x29, 0x0, 0x4, 0xffffffff, 0x9, @mcast1, @loopback, 0x40, 0x8000, 0x88, 0x5}}) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000780)={0x1, 0x0, {0x26, 0x1b, 0x10, 0xa, 0x1, 0x3f, 0x3, 0x29, 0xffffffffffffffff}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pselect6(0x40, &(0x7f00000007c0)={0x10bf, 0xffffffff, 0x0, 0x6, 0x1f, 0x8, 0x1000, 0x30f92001}, &(0x7f0000000800)={0x6, 0x4, 0x7fffffff, 0x3, 0x7, 0x8, 0xe0000, 0x5}, &(0x7f0000000840)={0x7, 0x8, 0x2, 0x6, 0x1, 0x25, 0x6, 0x9}, &(0x7f0000000880)={0x77359400}, &(0x7f0000000900)={&(0x7f00000008c0)={[0x1]}, 0x8}) recvfrom$l2tp6(r4, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r8 = socket$l2tp6(0xa, 0x2, 0x73) getpeername$l2tp6(r8, &(0x7f0000000a40)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000a80)=0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r9, 0x4008ae8a, &(0x7f0000000b00)={0x2, 0x0, [{0xc0000001, 0x8, 0x8dad, 0xacb2, 0x2}, {0x80000000, 0x80000001, 0x80, 0x200, 0x9}]}) socket$inet_udplite(0x2, 0x2, 0x88) r10 = socket(0x25, 0x80000, 0x5) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r9) sendmsg$L2TP_CMD_TUNNEL_DELETE(r10, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r11, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$SIOCGETVIFCNT(r10, 0x89e0, &(0x7f0000000c80)={0x1}) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x28, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x800}]}, 0x28}, 0x1, 0x0, 0x0, 0x8004800}, 0x4) 11:10:09 executing program 1: epoll_create(0x67) 11:10:09 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (fail_nth: 1) [ 1928.710446][T27282] FAULT_INJECTION: forcing a failure. [ 1928.710446][T27282] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1928.727276][T27282] CPU: 0 PID: 27282 Comm: syz-executor.2 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1928.737567][T27282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1928.747644][T27282] Call Trace: [ 1928.750944][T27282] [ 1928.753895][T27282] dump_stack_lvl+0x125/0x1b0 [ 1928.758629][T27282] should_fail_ex+0x493/0x5b0 [ 1928.763611][T27282] _copy_from_user+0x30/0xf0 [ 1928.768955][T27282] __sys_bpf+0x210/0x4a00 [ 1928.773325][T27282] ? ksys_write+0x214/0x250 [ 1928.777874][T27282] ? bpf_perf_link_attach+0x540/0x540 [ 1928.783374][T27282] ? preempt_count_add+0x72/0x140 [ 1928.788532][T27282] ? vfs_write+0x14c/0xdf0 [ 1928.792986][T27282] ? __mutex_unlock_slowpath+0x164/0x650 [ 1928.798658][T27282] ? bit_wait_timeout+0x160/0x160 [ 1928.803737][T27282] ? fput+0x32/0x390 [ 1928.807676][T27282] ? ksys_write+0x1a7/0x250 [ 1928.812235][T27282] ? __ia32_sys_read+0xb0/0xb0 [ 1928.817054][T27282] __x64_sys_bpf+0x78/0xc0 [ 1928.821951][T27282] ? syscall_enter_from_user_mode+0x7d/0x110 [ 1928.827969][T27282] do_syscall_64+0x40/0x110 [ 1928.832579][T27282] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1928.838515][T27282] RIP: 0033:0x7f718687cce9 [ 1928.842953][T27282] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1928.863355][T27282] RSP: 002b:00007f71875a40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1928.871759][T27282] RAX: ffffffffffffffda RBX: 00007f718699bf80 RCX: 00007f718687cce9 [ 1928.879727][T27282] RDX: 0000000000000010 RSI: 0000000020000ac0 RDI: 000000000000000f [ 1928.887957][T27282] RBP: 00007f71875a4120 R08: 0000000000000000 R09: 0000000000000000 [ 1928.895965][T27282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:10:09 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (fail_nth: 1) 11:10:09 executing program 1: epoll_create(0x0) [ 1928.904075][T27282] R13: 000000000000000b R14: 00007f718699bf80 R15: 00007ffd9c4cf9e8 [ 1928.912064][T27282] [ 1928.941835][T27289] FAULT_INJECTION: forcing a failure. [ 1928.941835][T27289] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1928.961858][T27289] CPU: 1 PID: 27289 Comm: syz-executor.0 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1928.972317][T27289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1928.982380][T27289] Call Trace: [ 1928.985666][T27289] [ 1928.988589][T27289] dump_stack_lvl+0x125/0x1b0 [ 1928.993375][T27289] should_fail_ex+0x493/0x5b0 [ 1928.998063][T27289] _copy_from_user+0x30/0xf0 [ 1929.002659][T27289] __sys_bpf+0x210/0x4a00 [ 1929.006989][T27289] ? ksys_write+0x214/0x250 [ 1929.011494][T27289] ? bpf_perf_link_attach+0x540/0x540 [ 1929.016951][T27289] ? preempt_count_add+0x72/0x140 [ 1929.021974][T27289] ? vfs_write+0x14c/0xdf0 [ 1929.026409][T27289] ? __mutex_unlock_slowpath+0x164/0x650 [ 1929.032073][T27289] ? bit_wait_timeout+0x160/0x160 [ 1929.037101][T27289] ? fput+0x32/0x390 [ 1929.040995][T27289] ? ksys_write+0x1a7/0x250 [ 1929.045532][T27289] ? __ia32_sys_read+0xb0/0xb0 [ 1929.050297][T27289] __x64_sys_bpf+0x78/0xc0 [ 1929.054747][T27289] ? syscall_enter_from_user_mode+0x7d/0x110 [ 1929.060737][T27289] do_syscall_64+0x40/0x110 [ 1929.065260][T27289] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1929.071170][T27289] RIP: 0033:0x7fafd387cce9 [ 1929.075606][T27289] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1929.095224][T27289] RSP: 002b:00007fafd46b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1929.103666][T27289] RAX: ffffffffffffffda RBX: 00007fafd399bf80 RCX: 00007fafd387cce9 [ 1929.111636][T27289] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000f [ 1929.119606][T27289] RBP: 00007fafd46b4120 R08: 0000000000000000 R09: 0000000000000000 [ 1929.127751][T27289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:10:09 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (fail_nth: 2) [ 1929.135842][T27289] R13: 000000000000000b R14: 00007fafd399bf80 R15: 00007ffffe438428 [ 1929.143842][T27289] 11:10:10 executing program 1: epoll_create(0x0) 11:10:10 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (fail_nth: 1) [ 1929.182962][T27293] FAULT_INJECTION: forcing a failure. [ 1929.182962][T27293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1929.199577][T27293] CPU: 0 PID: 27293 Comm: syz-executor.2 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1929.209529][T27293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1929.219612][T27293] Call Trace: [ 1929.222910][T27293] [ 1929.225871][T27293] dump_stack_lvl+0x125/0x1b0 11:10:10 executing program 1: epoll_create(0x0) [ 1929.230593][T27293] should_fail_ex+0x493/0x5b0 [ 1929.235307][T27293] _copy_to_user+0x30/0xb0 [ 1929.239775][T27293] simple_read_from_buffer+0xd0/0x160 [ 1929.245190][T27293] proc_fail_nth_read+0x1b0/0x280 [ 1929.250251][T27293] ? proc_fault_inject_read+0x280/0x280 [ 1929.255849][T27293] ? proc_fault_inject_read+0x280/0x280 [ 1929.261432][T27293] vfs_read+0x1ce/0x8f0 [ 1929.265627][T27293] ? __fdget_pos+0xe7/0x170 [ 1929.270174][T27293] ? kernel_read+0x70/0x70 [ 1929.274633][T27293] ? mutex_trylock+0x130/0x130 11:10:10 executing program 1: epoll_create(0x67) (fail_nth: 1) [ 1929.279444][T27293] ? __fget_files+0x256/0x400 [ 1929.284435][T27293] ksys_read+0x12f/0x250 [ 1929.288720][T27293] ? vfs_write+0xdf0/0xdf0 [ 1929.293178][T27293] ? rcu_is_watching+0x12/0xb0 [ 1929.297980][T27293] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1929.304011][T27293] do_syscall_64+0x40/0x110 [ 1929.308563][T27293] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1929.314491][T27293] RIP: 0033:0x7f718687b98c [ 1929.317586][T27301] FAULT_INJECTION: forcing a failure. [ 1929.317586][T27301] name failslab, interval 1, probability 0, space 0, times 1 [ 1929.318911][T27293] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1929.318935][T27293] RSP: 002b:00007f71875a40c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1929.318958][T27293] RAX: ffffffffffffffda RBX: 00007f718699bf80 RCX: 00007f718687b98c [ 1929.367635][T27293] RDX: 000000000000000f RSI: 00007f71875a4130 RDI: 0000000000000003 [ 1929.375615][T27293] RBP: 00007f71875a4120 R08: 0000000000000000 R09: 0000000000000000 [ 1929.383599][T27293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1929.391582][T27293] R13: 000000000000000b R14: 00007f718699bf80 R15: 00007ffd9c4cf9e8 [ 1929.399674][T27293] [ 1929.402727][T27301] CPU: 1 PID: 27301 Comm: syz-executor.1 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1929.412818][T27301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1929.412846][T27299] FAULT_INJECTION: forcing a failure. 11:10:10 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (fail_nth: 2) [ 1929.412846][T27299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1929.422872][T27301] Call Trace: [ 1929.422887][T27301] [ 1929.422896][T27301] dump_stack_lvl+0x125/0x1b0 [ 1929.422932][T27301] should_fail_ex+0x493/0x5b0 [ 1929.422956][T27301] should_failslab+0x9/0x20 [ 1929.422986][T27301] kmalloc_trace+0x6b/0x330 [ 1929.423011][T27301] ? ksys_write+0x1a7/0x250 [ 1929.423039][T27301] ? do_epoll_create+0x62/0x470 [ 1929.423068][T27301] do_epoll_create+0x62/0x470 [ 1929.423095][T27301] __x64_sys_epoll_create+0x45/0x70 [ 1929.423122][T27301] do_syscall_64+0x40/0x110 [ 1929.423153][T27301] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1929.423190][T27301] RIP: 0033:0x7f454a27cce9 [ 1929.423209][T27301] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1929.423231][T27301] RSP: 002b:00007f454b0360c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 1929.423255][T27301] RAX: ffffffffffffffda RBX: 00007f454a39bf80 RCX: 00007f454a27cce9 [ 1929.423271][T27301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000067 [ 1929.423286][T27301] RBP: 00007f454b036120 R08: 0000000000000000 R09: 0000000000000000 [ 1929.423301][T27301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1929.423315][T27301] R13: 000000000000000b R14: 00007f454a39bf80 R15: 00007fff12359878 [ 1929.423347][T27301] [ 1929.486826][T27303] FAULT_INJECTION: forcing a failure. [ 1929.486826][T27303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1929.505807][T27299] CPU: 0 PID: 27299 Comm: syz-executor.4 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1929.591042][T27299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1929.601202][T27299] Call Trace: [ 1929.604488][T27299] [ 1929.607442][T27299] dump_stack_lvl+0x125/0x1b0 [ 1929.612148][T27299] should_fail_ex+0x493/0x5b0 [ 1929.616948][T27299] _copy_from_user+0x30/0xf0 [ 1929.621665][T27299] __sys_bpf+0x210/0x4a00 [ 1929.626022][T27299] ? ksys_write+0x214/0x250 [ 1929.630551][T27299] ? bpf_perf_link_attach+0x540/0x540 [ 1929.635953][T27299] ? preempt_count_add+0x72/0x140 [ 1929.641006][T27299] ? vfs_write+0x14c/0xdf0 [ 1929.645431][T27299] ? __mutex_unlock_slowpath+0x164/0x650 [ 1929.651071][T27299] ? bit_wait_timeout+0x160/0x160 [ 1929.656105][T27299] ? fput+0x32/0x390 [ 1929.660019][T27299] ? ksys_write+0x1a7/0x250 [ 1929.664528][T27299] ? __ia32_sys_read+0xb0/0xb0 [ 1929.669297][T27299] __x64_sys_bpf+0x78/0xc0 [ 1929.673716][T27299] ? syscall_enter_from_user_mode+0x7d/0x110 [ 1929.679698][T27299] do_syscall_64+0x40/0x110 [ 1929.684325][T27299] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1929.690340][T27299] RIP: 0033:0x7f3573c7cce9 [ 1929.694764][T27299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1929.714387][T27299] RSP: 002b:00007f35749b00c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1929.722805][T27299] RAX: ffffffffffffffda RBX: 00007f3573d9bf80 RCX: 00007f3573c7cce9 [ 1929.731038][T27299] RDX: 0000000000000048 RSI: 0000000020000b00 RDI: 0000000000000000 [ 1929.739007][T27299] RBP: 00007f35749b0120 R08: 0000000000000000 R09: 0000000000000000 [ 1929.747061][T27299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1929.755034][T27299] R13: 000000000000000b R14: 00007f3573d9bf80 R15: 00007ffcaddf01c8 [ 1929.763139][T27299] [ 1929.769127][T27303] CPU: 0 PID: 27303 Comm: syz-executor.0 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1929.779405][T27303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1929.789556][T27303] Call Trace: [ 1929.792834][T27303] [ 1929.795758][T27303] dump_stack_lvl+0x125/0x1b0 [ 1929.800444][T27303] should_fail_ex+0x493/0x5b0 [ 1929.805125][T27303] _copy_to_user+0x30/0xb0 [ 1929.809571][T27303] simple_read_from_buffer+0xd0/0x160 [ 1929.814983][T27303] proc_fail_nth_read+0x1b0/0x280 [ 1929.820013][T27303] ? proc_fault_inject_read+0x280/0x280 [ 1929.825568][T27303] ? proc_fault_inject_read+0x280/0x280 [ 1929.831132][T27303] vfs_read+0x1ce/0x8f0 [ 1929.835315][T27303] ? __fdget_pos+0xe7/0x170 [ 1929.839825][T27303] ? kernel_read+0x70/0x70 [ 1929.844254][T27303] ? mutex_trylock+0x130/0x130 [ 1929.849037][T27303] ? __fget_files+0x256/0x400 [ 1929.853734][T27303] ksys_read+0x12f/0x250 [ 1929.857987][T27303] ? vfs_write+0xdf0/0xdf0 [ 1929.862404][T27303] ? rcu_is_watching+0x12/0xb0 [ 1929.867259][T27303] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1929.873251][T27303] do_syscall_64+0x40/0x110 [ 1929.877774][T27303] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1929.883670][T27303] RIP: 0033:0x7fafd387b98c [ 1929.888082][T27303] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1929.907695][T27303] RSP: 002b:00007fafd46b40c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1929.916110][T27303] RAX: ffffffffffffffda RBX: 00007fafd399bf80 RCX: 00007fafd387b98c [ 1929.924085][T27303] RDX: 000000000000000f RSI: 00007fafd46b4130 RDI: 0000000000000003 11:10:10 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (fail_nth: 1) [ 1929.932058][T27303] RBP: 00007fafd46b4120 R08: 0000000000000000 R09: 0000000000000000 [ 1929.940053][T27303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1929.948289][T27303] R13: 000000000000000b R14: 00007fafd399bf80 R15: 00007ffffe438428 [ 1929.956290][T27303] [ 1930.004411][T27305] FAULT_INJECTION: forcing a failure. [ 1930.004411][T27305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1930.020582][T27305] CPU: 1 PID: 27305 Comm: syz-executor.5 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1930.030623][T27305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1930.040706][T27305] Call Trace: [ 1930.044021][T27305] [ 1930.046970][T27305] dump_stack_lvl+0x125/0x1b0 11:10:10 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (fail_nth: 1) 11:10:10 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:10 executing program 1: epoll_create(0x67) (fail_nth: 2) 11:10:10 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (fail_nth: 2) [ 1930.049051][T27307] FAULT_INJECTION: forcing a failure. [ 1930.049051][T27307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1930.051665][T27305] should_fail_ex+0x493/0x5b0 [ 1930.069386][T27305] _copy_to_user+0x30/0xb0 [ 1930.073840][T27305] simple_read_from_buffer+0xd0/0x160 [ 1930.079253][T27305] proc_fail_nth_read+0x1b0/0x280 [ 1930.084316][T27305] ? proc_fault_inject_read+0x280/0x280 [ 1930.089888][T27305] ? proc_fault_inject_read+0x280/0x280 [ 1930.095435][T27305] vfs_read+0x1ce/0x8f0 [ 1930.099594][T27305] ? __fdget_pos+0xe7/0x170 [ 1930.104100][T27305] ? kernel_read+0x70/0x70 [ 1930.108516][T27305] ? mutex_trylock+0x130/0x130 [ 1930.113397][T27305] ? __fget_files+0x256/0x400 [ 1930.118171][T27305] ksys_read+0x12f/0x250 [ 1930.122415][T27305] ? vfs_write+0xdf0/0xdf0 [ 1930.126936][T27305] ? rcu_is_watching+0x12/0xb0 [ 1930.131722][T27305] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1930.137902][T27305] do_syscall_64+0x40/0x110 [ 1930.142506][T27305] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1930.148411][T27305] RIP: 0033:0x7f6052c7b98c [ 1930.152822][T27305] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1930.172532][T27305] RSP: 002b:00007f6053a8c0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1930.180970][T27305] RAX: ffffffffffffffda RBX: 00007f6052d9bf80 RCX: 00007f6052c7b98c [ 1930.188968][T27305] RDX: 000000000000000f RSI: 00007f6053a8c130 RDI: 0000000000000003 [ 1930.196963][T27305] RBP: 00007f6053a8c120 R08: 0000000000000000 R09: 0000000000000000 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x2, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1930.204939][T27305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1930.212911][T27305] R13: 000000000000000b R14: 00007f6052d9bf80 R15: 00007ffc43e0e248 [ 1930.221010][T27305] [ 1930.239449][T27310] FAULT_INJECTION: forcing a failure. [ 1930.239449][T27310] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:10:11 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) [ 1930.252890][T27310] CPU: 1 PID: 27310 Comm: syz-executor.4 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1930.262901][T27310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1930.273079][T27310] Call Trace: [ 1930.276378][T27310] [ 1930.279331][T27310] dump_stack_lvl+0x125/0x1b0 [ 1930.284137][T27310] should_fail_ex+0x493/0x5b0 [ 1930.288853][T27310] _copy_to_user+0x30/0xb0 [ 1930.293320][T27310] simple_read_from_buffer+0xd0/0x160 [ 1930.298915][T27310] proc_fail_nth_read+0x1b0/0x280 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x3, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1930.303985][T27310] ? proc_fault_inject_read+0x280/0x280 [ 1930.309569][T27310] ? proc_fault_inject_read+0x280/0x280 [ 1930.315154][T27310] vfs_read+0x1ce/0x8f0 [ 1930.319350][T27310] ? __fdget_pos+0xe7/0x170 [ 1930.323887][T27310] ? kernel_read+0x70/0x70 [ 1930.328347][T27310] ? mutex_trylock+0x130/0x130 [ 1930.333229][T27310] ? __fget_files+0x256/0x400 [ 1930.337955][T27310] ksys_read+0x12f/0x250 [ 1930.342230][T27310] ? vfs_write+0xdf0/0xdf0 [ 1930.346673][T27310] ? rcu_is_watching+0x12/0xb0 [ 1930.351447][T27310] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1930.357524][T27310] do_syscall_64+0x40/0x110 [ 1930.362050][T27310] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1930.368047][T27310] RIP: 0033:0x7f3573c7b98c [ 1930.372461][T27310] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1930.392247][T27310] RSP: 002b:00007f35749b00c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1930.400749][T27310] RAX: ffffffffffffffda RBX: 00007f3573d9bf80 RCX: 00007f3573c7b98c [ 1930.408725][T27310] RDX: 000000000000000f RSI: 00007f35749b0130 RDI: 0000000000000003 [ 1930.416691][T27310] RBP: 00007f35749b0120 R08: 0000000000000000 R09: 0000000000000000 [ 1930.424747][T27310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1930.432714][T27310] R13: 000000000000000b R14: 00007f3573d9bf80 R15: 00007ffcaddf01c8 [ 1930.440784][T27310] 11:10:11 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 1930.464838][T27317] FAULT_INJECTION: forcing a failure. [ 1930.464838][T27317] name failslab, interval 1, probability 0, space 0, times 0 [ 1930.465815][T27307] CPU: 1 PID: 27307 Comm: syz-executor.3 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1930.487709][T27307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1930.498234][T27307] Call Trace: [ 1930.501536][T27307] [ 1930.504478][T27307] dump_stack_lvl+0x125/0x1b0 [ 1930.509180][T27307] should_fail_ex+0x493/0x5b0 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1930.513875][T27307] _copy_to_user+0x30/0xb0 [ 1930.518337][T27307] simple_read_from_buffer+0xd0/0x160 [ 1930.523745][T27307] proc_fail_nth_read+0x1b0/0x280 [ 1930.528798][T27307] ? proc_fault_inject_read+0x280/0x280 [ 1930.534373][T27307] ? proc_fault_inject_read+0x280/0x280 [ 1930.539938][T27307] vfs_read+0x1ce/0x8f0 [ 1930.544208][T27307] ? kernel_read+0x70/0x70 [ 1930.548647][T27307] ? rcu_is_watching+0x12/0xb0 [ 1930.553442][T27307] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1930.559548][T27307] ? ksys_read+0x98/0x250 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x5, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1930.563909][T27307] ksys_read+0x12f/0x250 [ 1930.568174][T27307] ? vfs_write+0xdf0/0xdf0 [ 1930.572613][T27307] ? rcu_is_watching+0x12/0xb0 [ 1930.577409][T27307] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1930.583428][T27307] do_syscall_64+0x40/0x110 [ 1930.587981][T27307] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1930.593909][T27307] RIP: 0033:0x7f7ec607b98c [ 1930.598342][T27307] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1930.618411][T27307] RSP: 002b:00007f7ec6d0a0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1930.627023][T27307] RAX: ffffffffffffffda RBX: 00007f7ec619bf80 RCX: 00007f7ec607b98c [ 1930.635017][T27307] RDX: 000000000000000f RSI: 00007f7ec6d0a130 RDI: 0000000000000003 [ 1930.643006][T27307] RBP: 00007f7ec6d0a120 R08: 0000000000000000 R09: 0000000000000000 [ 1930.650991][T27307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1930.658968][T27307] R13: 000000000000000b R14: 00007f7ec619bf80 R15: 00007fff0d23f348 [ 1930.666948][T27307] 11:10:11 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:11 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:11 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x3) 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x6, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1930.696034][T27317] CPU: 1 PID: 27317 Comm: syz-executor.1 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1930.706007][T27317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1930.716091][T27317] Call Trace: [ 1930.719392][T27317] [ 1930.722343][T27317] dump_stack_lvl+0x125/0x1b0 [ 1930.727060][T27317] should_fail_ex+0x493/0x5b0 [ 1930.731769][T27317] should_failslab+0x9/0x20 [ 1930.736308][T27317] kmem_cache_alloc_lru+0x76/0x6f0 [ 1930.741422][T27317] ? kasan_save_stack+0x42/0x50 [ 1930.746276][T27317] ? kasan_save_stack+0x33/0x50 [ 1930.751122][T27317] ? __kasan_kmalloc+0xa2/0xb0 [ 1930.755904][T27317] ? __d_alloc+0x32/0xaa0 [ 1930.760229][T27317] __d_alloc+0x32/0xaa0 [ 1930.764401][T27317] d_alloc_pseudo+0x1c/0xb0 [ 1930.768923][T27317] alloc_file_pseudo+0xe3/0x1b0 [ 1930.773820][T27317] ? alloc_file+0x7f0/0x7f0 [ 1930.778336][T27317] ? lock_release+0x4c8/0x6a0 [ 1930.783041][T27317] ? do_raw_spin_lock+0x12d/0x2b0 [ 1930.788078][T27317] __anon_inode_getfile+0x136/0x3d0 [ 1930.793296][T27317] ? __x64_compat_sys_epoll_pwait2+0x290/0x290 [ 1930.799454][T27317] ? alloc_fd+0x2d9/0x6c0 [ 1930.803791][T27317] do_epoll_create+0x31b/0x470 [ 1930.808577][T27317] __x64_sys_epoll_create+0x45/0x70 [ 1930.813784][T27317] do_syscall_64+0x40/0x110 [ 1930.818305][T27317] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1930.824242][T27317] RIP: 0033:0x7f454a27cce9 [ 1930.828656][T27317] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1930.848269][T27317] RSP: 002b:00007f454b0360c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 1930.856681][T27317] RAX: ffffffffffffffda RBX: 00007f454a39bf80 RCX: 00007f454a27cce9 [ 1930.864648][T27317] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000067 [ 1930.872616][T27317] RBP: 00007f454b036120 R08: 0000000000000000 R09: 0000000000000000 [ 1930.880859][T27317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1930.888831][T27317] R13: 000000000000000b R14: 00007f454a39bf80 R15: 00007fff12359878 [ 1930.896900][T27317] 11:10:11 executing program 1: epoll_create(0x67) (fail_nth: 3) 11:10:11 executing program 0: bpf$BPF_GET_PROG_INFO(0x2, 0x0, 0x0) 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x7, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:11 executing program 0: bpf$BPF_GET_PROG_INFO(0x3, 0x0, 0x0) 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x8, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1931.002218][T27332] FAULT_INJECTION: forcing a failure. [ 1931.002218][T27332] name failslab, interval 1, probability 0, space 0, times 0 [ 1931.031811][T27332] CPU: 0 PID: 27332 Comm: syz-executor.1 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1931.041848][T27332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1931.052019][T27332] Call Trace: [ 1931.055328][T27332] [ 1931.058277][T27332] dump_stack_lvl+0x125/0x1b0 [ 1931.063098][T27332] should_fail_ex+0x493/0x5b0 [ 1931.067811][T27332] should_failslab+0x9/0x20 [ 1931.072362][T27332] kmem_cache_alloc+0x69/0x320 [ 1931.077176][T27332] alloc_empty_file+0x73/0x1d0 [ 1931.081993][T27332] alloc_file+0x5d/0x7f0 [ 1931.086287][T27332] alloc_file_pseudo+0x120/0x1b0 [ 1931.091360][T27332] ? alloc_file+0x7f0/0x7f0 [ 1931.095995][T27332] ? lock_release+0x4c8/0x6a0 11:10:11 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x300) 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0x9, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:11 executing program 2: bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1931.100709][T27332] ? do_raw_spin_lock+0x12d/0x2b0 [ 1931.105776][T27332] __anon_inode_getfile+0x136/0x3d0 [ 1931.111021][T27332] ? __x64_compat_sys_epoll_pwait2+0x290/0x290 [ 1931.117224][T27332] ? alloc_fd+0x2d9/0x6c0 [ 1931.121589][T27332] do_epoll_create+0x31b/0x470 [ 1931.126397][T27332] __x64_sys_epoll_create+0x45/0x70 [ 1931.131898][T27332] do_syscall_64+0x40/0x110 [ 1931.136469][T27332] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1931.142521][T27332] RIP: 0033:0x7f454a27cce9 [ 1931.146960][T27332] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1931.166941][T27332] RSP: 002b:00007f454b0360c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 1931.175388][T27332] RAX: ffffffffffffffda RBX: 00007f454a39bf80 RCX: 00007f454a27cce9 [ 1931.183471][T27332] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000067 [ 1931.191469][T27332] RBP: 00007f454b036120 R08: 0000000000000000 R09: 0000000000000000 11:10:12 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x4897, 0x4) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0xb, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:12 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x3000000) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 1931.199468][T27332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.207543][T27332] R13: 000000000000000b R14: 00007f454a39bf80 R15: 00007fff12359878 [ 1931.215516][T27332] 11:10:12 executing program 1: epoll_create(0x67) (fail_nth: 4) 11:10:12 executing program 0: bpf$BPF_GET_PROG_INFO(0x4, 0x0, 0x0) 11:10:12 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x300000000000000) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x3, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0xc, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:12 executing program 0: bpf$BPF_GET_PROG_INFO(0x5, 0x0, 0x0) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x4, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x4897, 0x4) [ 1931.316350][T27360] FAULT_INJECTION: forcing a failure. [ 1931.316350][T27360] name failslab, interval 1, probability 0, space 0, times 0 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0xd, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1931.372248][T27360] CPU: 0 PID: 27360 Comm: syz-executor.1 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1931.382201][T27360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1931.392461][T27360] Call Trace: [ 1931.395764][T27360] [ 1931.398715][T27360] dump_stack_lvl+0x125/0x1b0 [ 1931.403443][T27360] should_fail_ex+0x493/0x5b0 [ 1931.408164][T27360] should_failslab+0x9/0x20 [ 1931.412709][T27360] kmem_cache_alloc+0x69/0x320 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x5, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x5, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000100)='1\x00', 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='\x00', 0x0, 0x18, r2}, 0x18) [ 1931.417521][T27360] ? __memcg_slab_post_alloc_hook+0x1dc/0x370 [ 1931.423628][T27360] security_file_alloc+0x41/0x250 [ 1931.428693][T27360] ? kmem_cache_alloc+0x17c/0x320 [ 1931.433762][T27360] init_file+0x99/0x250 [ 1931.437985][T27360] alloc_empty_file+0x91/0x1d0 [ 1931.442806][T27360] alloc_file+0x5d/0x7f0 [ 1931.447103][T27360] alloc_file_pseudo+0x120/0x1b0 [ 1931.452081][T27360] ? alloc_file+0x7f0/0x7f0 [ 1931.456623][T27360] ? lock_release+0x4c8/0x6a0 [ 1931.461332][T27360] ? do_raw_spin_lock+0x12d/0x2b0 [ 1931.466391][T27360] __anon_inode_getfile+0x136/0x3d0 [ 1931.471696][T27360] ? __x64_compat_sys_epoll_pwait2+0x290/0x290 [ 1931.477857][T27360] ? alloc_fd+0x2d9/0x6c0 [ 1931.482198][T27360] do_epoll_create+0x31b/0x470 [ 1931.486981][T27360] __x64_sys_epoll_create+0x45/0x70 [ 1931.492199][T27360] do_syscall_64+0x40/0x110 [ 1931.496734][T27360] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1931.502655][T27360] RIP: 0033:0x7f454a27cce9 [ 1931.507080][T27360] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1931.526710][T27360] RSP: 002b:00007f454b0360c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 1931.535128][T27360] RAX: ffffffffffffffda RBX: 00007f454a39bf80 RCX: 00007f454a27cce9 [ 1931.543122][T27360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000067 [ 1931.551534][T27360] RBP: 00007f454b036120 R08: 0000000000000000 R09: 0000000000000000 [ 1931.559509][T27360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.567488][T27360] R13: 000000000000000b R14: 00007f454a39bf80 R15: 00007fff12359878 [ 1931.575816][T27360] 11:10:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x5, 0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, &(0x7f0000000100)='1\x00', 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='\x00', 0x0, 0x18, r2}, 0x18) 11:10:12 executing program 1: epoll_create(0x67) (fail_nth: 5) 11:10:12 executing program 0: bpf$BPF_GET_PROG_INFO(0x6, 0x0, 0x0) 11:10:12 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x4897, 0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x4897, 0x4) (async) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x6, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0xe, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:12 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfff, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x7ff}, 0x20) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0x10, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 1931.746137][T27392] FAULT_INJECTION: forcing a failure. [ 1931.746137][T27392] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1931.777807][T27392] CPU: 0 PID: 27392 Comm: syz-executor.1 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1931.787861][T27392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1931.797957][T27392] Call Trace: [ 1931.801254][T27392] [ 1931.804200][T27392] dump_stack_lvl+0x125/0x1b0 [ 1931.808933][T27392] should_fail_ex+0x493/0x5b0 [ 1931.813657][T27392] _copy_to_user+0x30/0xb0 [ 1931.818107][T27392] simple_read_from_buffer+0xd0/0x160 [ 1931.823519][T27392] proc_fail_nth_read+0x1b0/0x280 [ 1931.828666][T27392] ? proc_fault_inject_read+0x280/0x280 [ 1931.834337][T27392] ? proc_fault_inject_read+0x280/0x280 [ 1931.839927][T27392] vfs_read+0x1ce/0x8f0 [ 1931.844119][T27392] ? __fdget_pos+0xe7/0x170 [ 1931.848656][T27392] ? alloc_file_pseudo+0x140/0x1b0 [ 1931.853830][T27392] ? kernel_read+0x70/0x70 [ 1931.858302][T27392] ? mutex_trylock+0x130/0x130 [ 1931.863134][T27392] ? __fget_files+0x256/0x400 [ 1931.867891][T27392] ksys_read+0x12f/0x250 [ 1931.872173][T27392] ? vfs_write+0xdf0/0xdf0 [ 1931.876626][T27392] ? rcu_is_watching+0x12/0xb0 [ 1931.881422][T27392] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1931.887427][T27392] do_syscall_64+0x40/0x110 [ 1931.891959][T27392] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1931.897878][T27392] RIP: 0033:0x7f454a27b98c [ 1931.902297][T27392] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1931.922358][T27392] RSP: 002b:00007f454b0360c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1931.931465][T27392] RAX: ffffffffffffffda RBX: 00007f454a39bf80 RCX: 00007f454a27b98c 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x7, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x5, 0x4) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 32) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 32) write$yama_ptrace_scope(r1, &(0x7f0000000100)='1\x00', 0x2) (async) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='\x00', 0x0, 0x18, r2}, 0x18) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x8, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0x11, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:12 executing program 0: bpf$BPF_GET_PROG_INFO(0x7, 0x0, 0x0) [ 1931.939453][T27392] RDX: 000000000000000f RSI: 00007f454b036130 RDI: 0000000000000003 [ 1931.947514][T27392] RBP: 00007f454b036120 R08: 0000000000000000 R09: 0000000000000000 [ 1931.955667][T27392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1931.963643][T27392] R13: 000000000000000b R14: 00007f454a39bf80 R15: 00007fff12359878 [ 1931.972141][T27392] 11:10:12 executing program 1: epoll_create(0x67) 11:10:12 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfff, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x7ff}, 0x20) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfff, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x7ff}, 0x20) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) 11:10:12 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000100)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getnetconf={0x2c, 0x52, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x3ff}, @NETCONFA_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:12 executing program 0: bpf$BPF_GET_PROG_INFO(0x8, 0x0, 0x0) 11:10:12 executing program 1: epoll_create(0x3) socket$inet6_sctp(0xa, 0x1, 0x84) 11:10:12 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfff, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x7ff}, 0x20) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:12 executing program 2: bpf$BPF_GET_PROG_INFO(0x12, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:12 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xa, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000100)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getnetconf={0x2c, 0x52, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x3ff}, @NETCONFA_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x9, 0x0, 0x0) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x2f, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x78d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x12}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e08}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xd69e9f1997f89ff4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x9, 0xaf, &(0x7f0000000280)=""/175, 0x41000, 0x2c, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x10, 0x8, 0x3}, 0x10, r3, r4, 0x4, 0x0, &(0x7f00000006c0)=[{0x3, 0x5, 0x5, 0x4}, {0x0, 0x4, 0x8, 0x5}, {0x3, 0x5, 0x8, 0x5}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0xaa9}, 0x90) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x13, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 1: epoll_create(0x3) socket$inet6_sctp(0xa, 0x1, 0x84) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xb, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000100)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getnetconf={0x2c, 0x52, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x3ff}, @NETCONFA_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x2f, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x78d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x12}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e08}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xd69e9f1997f89ff4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x9, 0xaf, &(0x7f0000000280)=""/175, 0x41000, 0x2c, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x10, 0x8, 0x3}, 0x10, r3, r4, 0x4, 0x0, &(0x7f00000006c0)=[{0x3, 0x5, 0x5, 0x4}, {0x0, 0x4, 0x8, 0x5}, {0x3, 0x5, 0x8, 0x5}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0xaa9}, 0x90) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x2f, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x78d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x12}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e08}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xd69e9f1997f89ff4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x9, 0xaf, &(0x7f0000000280)=""/175, 0x41000, 0x2c, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x10, 0x8, 0x3}, 0x10, r3, r4, 0x4, 0x0, &(0x7f00000006c0)=[{0x3, 0x5, 0x5, 0x4}, {0x0, 0x4, 0x8, 0x5}, {0x3, 0x5, 0x8, 0x5}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0xaa9}, 0x90) (async) 11:10:13 executing program 1: epoll_create(0x3) socket$inet6_sctp(0xa, 0x1, 0x84) (async) socket$inet6_sctp(0xa, 0x1, 0x84) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xc, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x15, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0xb, 0x0, 0x0) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r0, 0x10, 0x0, @in6={0xa, 0x4e21, 0x1, @empty, 0x1}}}, 0xa0) 11:10:13 executing program 1: epoll_create(0x67) epoll_create(0x80) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_io_uring_setup(0x5479, &(0x7f0000000000)={0x0, 0x647c, 0x2, 0x2, 0x3d3, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0xc, 0x0, 0x0) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x16, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x2f, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x78d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x12}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e08}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xd69e9f1997f89ff4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x9, 0xaf, &(0x7f0000000280)=""/175, 0x41000, 0x2c, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x10, 0x8, 0x3}, 0x10, r3, r4, 0x4, 0x0, &(0x7f00000006c0)=[{0x3, 0x5, 0x5, 0x4}, {0x0, 0x4, 0x8, 0x5}, {0x3, 0x5, 0x8, 0x5}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0xaa9}, 0x90) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1d, 0x2f, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x78d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x12}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6e08}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xd69e9f1997f89ff4}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='GPL\x00', 0x9, 0xaf, &(0x7f0000000280)=""/175, 0x41000, 0x2c, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x10, 0x8, 0x3}, 0x10, r3, r4, 0x4, 0x0, &(0x7f00000006c0)=[{0x3, 0x5, 0x5, 0x4}, {0x0, 0x4, 0x8, 0x5}, {0x3, 0x5, 0x8, 0x5}, {0x5, 0x5, 0xe, 0x8}], 0x10, 0xaa9}, 0x90) (async) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)={0x5, 0x0, [{0xa, 0x4, 0x5, 0x100}, {0xc0000001, 0x8, 0x7b7b, 0x40, 0x7}, {0x0, 0x4, 0x0, 0x9}, {0xd, 0x8, 0x5, 0x80000000, 0x1ff}, {0xc0000001, 0x0, 0x203, 0x8}]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x20, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, 0x3, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) recvfrom$netrom(r1, &(0x7f00000004c0)=""/111, 0x6f, 0x10001, 0x0, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0), 0x0, 0x8, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xd, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x17, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0xd, 0x0, 0x0) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r0, 0x10, 0x0, @in6={0xa, 0x4e21, 0x1, @empty, 0x1}}}, 0xa0) 11:10:13 executing program 1: epoll_create(0x67) (async) epoll_create(0x80) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) syz_io_uring_setup(0x5479, &(0x7f0000000000)={0x0, 0x647c, 0x2, 0x2, 0x3d3, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r0, 0x10, 0x0, @in6={0xa, 0x4e21, 0x1, @empty, 0x1}}}, 0xa0) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x18, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0xe, 0x0, 0x0) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xe, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)={0x5, 0x0, [{0xa, 0x4, 0x5, 0x100}, {0xc0000001, 0x8, 0x7b7b, 0x40, 0x7}, {0x0, 0x4, 0x0, 0x9}, {0xd, 0x8, 0x5, 0x80000000, 0x1ff}, {0xc0000001, 0x0, 0x203, 0x8}]}) (async) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)={0x5, 0x0, [{0xa, 0x4, 0x5, 0x100}, {0xc0000001, 0x8, 0x7b7b, 0x40, 0x7}, {0x0, 0x4, 0x0, 0x9}, {0xd, 0x8, 0x5, 0x80000000, 0x1ff}, {0xc0000001, 0x0, 0x203, 0x8}]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x20, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, 0x3, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) recvfrom$netrom(r1, &(0x7f00000004c0)=""/111, 0x6f, 0x10001, 0x0, 0x0) (async) recvfrom$netrom(r1, &(0x7f00000004c0)=""/111, 0x6f, 0x10001, 0x0, 0x0) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0), 0x0, 0x8, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 11:10:13 executing program 1: epoll_create(0x67) epoll_create(0x80) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) syz_io_uring_setup(0x5479, &(0x7f0000000000)={0x0, 0x647c, 0x2, 0x2, 0x3d3, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x19, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x10, 0x0, 0x0) 11:10:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x3854c0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000280)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x5, 0x6, 0x5}) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r0, 0xc01864ba, &(0x7f0000000300)={0xa000, 0x0, r1, 0xdededede}) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xf, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000440)={0x5, 0x0, [{0xa, 0x4, 0x5, 0x100}, {0xc0000001, 0x8, 0x7b7b, 0x40, 0x7}, {0x0, 0x4, 0x0, 0x9}, {0xd, 0x8, 0x5, 0x80000000, 0x1ff}, {0xc0000001, 0x0, 0x203, 0x8}]}) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x20, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, 0x3, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) (async) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) (async) recvfrom$netrom(r1, &(0x7f00000004c0)=""/111, 0x6f, 0x10001, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0), 0x0, 0x8, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x1a, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x11, 0x0, 0x0) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x10, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x3854c0) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000280)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x5, 0x6, 0x5}) (rerun: 64) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r0, 0xc01864ba, &(0x7f0000000300)={0xa000, 0x0, r1, 0xdededede}) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x1b, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x12, 0x0, 0x0) 11:10:13 executing program 1: epoll_create(0x1) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x11, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x0, 0x40}, &(0x7f0000000180)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x10000000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_io_uring_submit(r0, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x1a, 0x0, r3, 0x80, &(0x7f0000000000)=@sco, 0x0, 0x0, 0x1}) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x13, 0x0, 0x0) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x12, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7fffffff, 0x3854c0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000280)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x5, 0x6, 0x5}) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r0, 0xc01864ba, &(0x7f0000000300)={0xa000, 0x0, r1, 0xdededede}) 11:10:13 executing program 1: epoll_create(0x1) epoll_create(0x1) (async) 11:10:13 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x0, 0x40}, &(0x7f0000000180)=0x0, &(0x7f00000000c0)) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x10000000) (async) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_io_uring_submit(r0, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x1a, 0x0, r3, 0x80, &(0x7f0000000000)=@sco, 0x0, 0x0, 0x1}) 11:10:13 executing program 2: bpf$BPF_GET_PROG_INFO(0x1d, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:13 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@empty, @multicast2}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x480d4) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xfa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 11:10:13 executing program 0: bpf$BPF_GET_PROG_INFO(0x14, 0x0, 0x0) 11:10:13 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x13, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 1: epoll_create(0x1) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x15, 0x0, 0x0) 11:10:14 executing program 2: bpf$BPF_GET_PROG_INFO(0x1e, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:14 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x0, 0x40}, &(0x7f0000000180)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x10000000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_io_uring_submit(r0, r2, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x1a, 0x0, r3, 0x80, &(0x7f0000000000)=@sco, 0x0, 0x0, 0x1}) 11:10:14 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@empty, @multicast2}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x480d4) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xfa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@empty, @multicast2}) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x480d4) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xfa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) (async) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x16, 0x0, 0x0) 11:10:14 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x14, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 2: bpf$BPF_GET_PROG_INFO(0x21, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:14 executing program 1: epoll_create(0x67) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xfd}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4000818) 11:10:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x40004, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x10, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x7f, 0x72, &(0x7f0000000140)=""/114, 0x41100, 0x20, '\x00', 0x0, 0x32, r0, 0x8, &(0x7f0000000200)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x5, 0xfffffffd}, 0x10, 0x0, r1, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r2, 0x1, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bind$netrom(r5, &(0x7f0000000000)={{0x3, @default, 0x6}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 11:10:14 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@empty, @multicast2}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x480d4) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xfa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 11:10:14 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x15, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x17, 0x0, 0x0) 11:10:14 executing program 2: bpf$BPF_GET_PROG_INFO(0x22, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:14 executing program 1: epoll_create(0x67) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xfd}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4000818) 11:10:14 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x16, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x18, 0x0, 0x0) 11:10:14 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0), 0x1a402, 0x0) write$khugepaged_scan(r0, &(0x7f00000000c0), 0x8) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000100)={0x800000000000000, 0x2000, 0x46b, 0xb, 0x6}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x24, 0x0, "53312d2c3bb2d495b8b782de5a9a1e52884287855c8013675f54066d811d48408e898da859062a0e16da456364eca29633010a7ad8bc66e63c721ea8492a6bed4978429df1397b2cde2cef1420036466"}, 0xd8) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x0, @mcast1, 0x5}}}, 0x38) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x10000, 0x0, 0x1, 0x2060, r2, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0xff, 0x1, 0x5}, 0x48) r3 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r3, &(0x7f0000000240)=""/160, 0xa0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x20) 11:10:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x40004, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x10, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x7f, 0x72, &(0x7f0000000140)=""/114, 0x41100, 0x20, '\x00', 0x0, 0x32, r0, 0x8, &(0x7f0000000200)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x5, 0xfffffffd}, 0x10, 0x0, r1, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r2, 0x1, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async, rerun: 64) bind$netrom(r5, &(0x7f0000000000)={{0x3, @default, 0x6}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (rerun: 64) 11:10:14 executing program 2: bpf$BPF_GET_PROG_INFO(0x23, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x40004, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x18) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x10, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x7f, 0x72, &(0x7f0000000140)=""/114, 0x41100, 0x20, '\x00', 0x0, 0x32, r0, 0x8, &(0x7f0000000200)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x5, 0xfffffffd}, 0x10, 0x0, r1, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r2, 0x1, r3, r4, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x90) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bind$netrom(r5, &(0x7f0000000000)={{0x3, @default, 0x6}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x19, 0x0, 0x0) 11:10:14 executing program 1: epoll_create(0x67) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xfd}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x400}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4000818) 11:10:14 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x17, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 0: bpf$BPF_GET_PROG_INFO(0x1a, 0x0, 0x0) 11:10:14 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r1, 0x1c, 0x0, @ib={0x1b, 0x66f, 0x7fff, {"70b7a90fe2234a7ea3cd632fb6110883"}, 0x800, 0x4, 0xfffffffffffffffb}}}, 0xa0) r2 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r2, 0x1, 0x4002) syz_pidfd_open(r2, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:14 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x18, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:14 executing program 1: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) epoll_create(0x67) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) epoll_create(0x3) 11:10:15 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0), 0x1a402, 0x0) write$khugepaged_scan(r0, &(0x7f00000000c0), 0x8) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000100)={0x800000000000000, 0x2000, 0x46b, 0xb, 0x6}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x24, 0x0, "53312d2c3bb2d495b8b782de5a9a1e52884287855c8013675f54066d811d48408e898da859062a0e16da456364eca29633010a7ad8bc66e63c721ea8492a6bed4978429df1397b2cde2cef1420036466"}, 0xd8) (async) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x24, 0x0, "53312d2c3bb2d495b8b782de5a9a1e52884287855c8013675f54066d811d48408e898da859062a0e16da456364eca29633010a7ad8bc66e63c721ea8492a6bed4978429df1397b2cde2cef1420036466"}, 0xd8) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x0, @mcast1, 0x5}}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x0, @mcast1, 0x5}}}, 0x38) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x10000, 0x0, 0x1, 0x2060, r2, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0xff, 0x1, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x10000, 0x0, 0x1, 0x2060, r2, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0xff, 0x1, 0x5}, 0x48) r3 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r3, &(0x7f0000000240)=""/160, 0xa0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x20) 11:10:15 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r1, 0x1c, 0x0, @ib={0x1b, 0x66f, 0x7fff, {"70b7a90fe2234a7ea3cd632fb6110883"}, 0x800, 0x4, 0xfffffffffffffffb}}}, 0xa0) r2 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r2, 0x1, 0x4002) syz_pidfd_open(r2, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r1, 0x1c, 0x0, @ib={0x1b, 0x66f, 0x7fff, {"70b7a90fe2234a7ea3cd632fb6110883"}, 0x800, 0x4, 0xfffffffffffffffb}}}, 0xa0) (async) syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") (async) ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r2, 0x1, 0x4002) (async) syz_pidfd_open(r2, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) 11:10:15 executing program 1: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) epoll_create(0x67) (async) epoll_create(0x67) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) epoll_create(0x3) 11:10:15 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x3, 0x0}, 0x10) 11:10:15 executing program 0: bpf$BPF_GET_PROG_INFO(0x1b, 0x0, 0x0) 11:10:15 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x19, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:15 executing program 1: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) epoll_create(0x67) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) epoll_create(0x3) (async) epoll_create(0x3) 11:10:15 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x300, 0x0}, 0x10) 11:10:15 executing program 0: bpf$BPF_GET_PROG_INFO(0x1c, 0x0, 0x0) 11:10:15 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1a, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:15 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x3000000, 0x0}, 0x10) 11:10:15 executing program 1: epoll_create(0x67) epoll_create(0xa39) 11:10:16 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r1, 0x1c, 0x0, @ib={0x1b, 0x66f, 0x7fff, {"70b7a90fe2234a7ea3cd632fb6110883"}, 0x800, 0x4, 0xfffffffffffffffb}}}, 0xa0) r2 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r2, 0x1, 0x4002) (async, rerun: 64) syz_pidfd_open(r2, 0x0) (async, rerun: 64) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:16 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0), 0x1a402, 0x0) write$khugepaged_scan(r0, &(0x7f00000000c0), 0x8) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000100)={0x800000000000000, 0x2000, 0x46b, 0xb, 0x6}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x24, 0x0, "53312d2c3bb2d495b8b782de5a9a1e52884287855c8013675f54066d811d48408e898da859062a0e16da456364eca29633010a7ad8bc66e63c721ea8492a6bed4978429df1397b2cde2cef1420036466"}, 0xd8) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x0, @mcast1, 0x5}}}, 0x38) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1a, 0x10000, 0x0, 0x1, 0x2060, r2, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0xff, 0x1, 0x5}, 0x48) (async) r3 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r3, &(0x7f0000000240)=""/160, 0xa0, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x20) 11:10:16 executing program 0: bpf$BPF_GET_PROG_INFO(0x1d, 0x0, 0x0) 11:10:16 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1b, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:16 executing program 1: epoll_create(0x67) (async, rerun: 64) epoll_create(0xa39) (rerun: 64) 11:10:16 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x90) 11:10:16 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_newnexthop={0x98, 0x68, 0x100, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x3, 0x0, 0xc}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_HOPLIMIT={0x5, 0x4, 0x20}}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_BLACKHOLE={0x4}, @NHA_GROUP={0x1c, 0x2, [{0x6, 0xab}, {0x0, 0x1}, {0x1, 0x1}]}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@dev={0xfe, 0x80, '\x00', 0x16}}, @NHA_FDB={0x4}, @NHA_GROUP={0x2c, 0x2, [{0x1, 0x49}, {0x0, 0x2}, {0x1}, {0x1, 0x81}, {0x2, 0x3}]}, @NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x801}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) 11:10:16 executing program 0: bpf$BPF_GET_PROG_INFO(0x1e, 0x0, 0x0) 11:10:16 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1c, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:16 executing program 1: epoll_create(0x67) (async) epoll_create(0xa39) 11:10:16 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1d, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:16 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_newnexthop={0x98, 0x68, 0x100, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x3, 0x0, 0xc}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_HOPLIMIT={0x5, 0x4, 0x20}}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_BLACKHOLE={0x4}, @NHA_GROUP={0x1c, 0x2, [{0x6, 0xab}, {0x0, 0x1}, {0x1, 0x1}]}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@dev={0xfe, 0x80, '\x00', 0x16}}, @NHA_FDB={0x4}, @NHA_GROUP={0x2c, 0x2, [{0x1, 0x49}, {0x0, 0x2}, {0x1}, {0x1, 0x81}, {0x2, 0x3}]}, @NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x801}, 0x80) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 32) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) (rerun: 32) 11:10:16 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_newnexthop={0x98, 0x68, 0x100, 0x70bd27, 0x25dfdbff, {0x2, 0x0, 0x3, 0x0, 0xc}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_HOPLIMIT={0x5, 0x4, 0x20}}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_BLACKHOLE={0x4}, @NHA_GROUP={0x1c, 0x2, [{0x6, 0xab}, {0x0, 0x1}, {0x1, 0x1}]}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@dev={0xfe, 0x80, '\x00', 0x16}}, @NHA_FDB={0x4}, @NHA_GROUP={0x2c, 0x2, [{0x1, 0x49}, {0x0, 0x2}, {0x1}, {0x1, 0x81}, {0x2, 0x3}]}, @NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x801}, 0x80) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 32) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) 11:10:17 executing program 1: epoll_create(0x67) socket$inet_udp(0x2, 0x2, 0x0) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0x21, 0x0, 0x0) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1e, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r0, 0xe10, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x68}, 0x1, 0x0, 0x0, 0x3}, 0x8000) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00f1ff7bd0fbff1abd8287bd6ceb198ae823eb35eb61ab6b33bca8ee23006e631e04790a45c20d5caac52b3de50b647848c6684479f1d2b2b888dc20f5675d10931d7792d7edab97f9b2f7ee357f720264ba39cd1a4cc2a2a06a2a0d86d4ab12fbbb938697f1be3154deefcc527a6434bbf760a7ce241b52b1dd95dd49cc0c84ed800e525af0c6832e21557900"/151, @ANYRES16=r0, @ANYBLOB="00042bbd7000fcdbdf250e0000000c000600000000000000000008000e000800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006001f1841c71d6225b2122b01000000010000003a0fd4e2ae197b8b05e99ed13017ce10f9ead3c8b09f5fab4ce8cc7528f5de937cb2030c54949c9ec9091d7521f293587c9c840a683487bb3b2b837e7f83524805b4dbde6b0530fcc11abba47bcb6ca9"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) 11:10:17 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x3f}, 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200280, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc, 0x2}, 0x48) 11:10:17 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6e) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0x22, 0x0, 0x0) 11:10:17 executing program 1: epoll_create(0x67) socket$inet_udp(0x2, 0x2, 0x0) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x21, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x3f}, 0x8) (async, rerun: 32) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200280, 0x0) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc, 0x2}, 0x48) 11:10:17 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r0, 0xe10, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x68}, 0x1, 0x0, 0x0, 0x3}, 0x8000) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00f1ff7bd0fbff1abd8287bd6ceb198ae823eb35eb61ab6b33bca8ee23006e631e04790a45c20d5caac52b3de50b647848c6684479f1d2b2b888dc20f5675d10931d7792d7edab97f9b2f7ee357f720264ba39cd1a4cc2a2a06a2a0d86d4ab12fbbb938697f1be3154deefcc527a6434bbf760a7ce241b52b1dd95dd49cc0c84ed800e525af0c6832e21557900"/151, @ANYRES16=r0, @ANYBLOB="00042bbd7000fcdbdf250e0000000c000600000000000000000008000e000800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006001f1841c71d6225b2122b01000000010000003a0fd4e2ae197b8b05e99ed13017ce10f9ead3c8b09f5fab4ce8cc7528f5de937cb2030c54949c9ec9091d7521f293587c9c840a683487bb3b2b837e7f83524805b4dbde6b0530fcc11abba47bcb6ca9"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r0, 0xe10, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x68}, 0x1, 0x0, 0x0, 0x3}, 0x8000) (async) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00f1ff7bd0fbff1abd8287bd6ceb198ae823eb35eb61ab6b33bca8ee23006e631e04790a45c20d5caac52b3de50b647848c6684479f1d2b2b888dc20f5675d10931d7792d7edab97f9b2f7ee357f720264ba39cd1a4cc2a2a06a2a0d86d4ab12fbbb938697f1be3154deefcc527a6434bbf760a7ce241b52b1dd95dd49cc0c84ed800e525af0c6832e21557900"/151, @ANYRES16=r0, @ANYBLOB="00042bbd7000fcdbdf250e0000000c000600000000000000000008000e000800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006001f1841c71d6225b2122b01000000010000003a0fd4e2ae197b8b05e99ed13017ce10f9ead3c8b09f5fab4ce8cc7528f5de937cb2030c54949c9ec9091d7521f293587c9c840a683487bb3b2b837e7f83524805b4dbde6b0530fcc11abba47bcb6ca9"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) (async) 11:10:17 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6e) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x22, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 1: epoll_create(0x67) socket$inet_udp(0x2, 0x2, 0x0) epoll_create(0x67) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0x23, 0x0, 0x0) 11:10:17 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r0, 0xe10, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc}}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x2c, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x68}, 0x1, 0x0, 0x0, 0x3}, 0x8000) (async) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00f1ff7bd0fbff1abd8287bd6ceb198ae823eb35eb61ab6b33bca8ee23006e631e04790a45c20d5caac52b3de50b647848c6684479f1d2b2b888dc20f5675d10931d7792d7edab97f9b2f7ee357f720264ba39cd1a4cc2a2a06a2a0d86d4ab12fbbb938697f1be3154deefcc527a6434bbf760a7ce241b52b1dd95dd49cc0c84ed800e525af0c6832e21557900"/151, @ANYRES16=r0, @ANYBLOB="00042bbd7000fcdbdf250e0000000c000600000000000000000008000e000800000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006001f1841c71d6225b2122b01000000010000003a0fd4e2ae197b8b05e99ed13017ce10f9ead3c8b09f5fab4ce8cc7528f5de937cb2030c54949c9ec9091d7521f293587c9c840a683487bb3b2b837e7f83524805b4dbde6b0530fcc11abba47bcb6ca9"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004000}, 0x40) 11:10:17 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6e) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x23, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)={0x3f}, 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200280, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc, 0x2}, 0x48) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x10) 11:10:17 executing program 1: epoll_create(0x3) 11:10:17 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x300, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x13, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x7, 0x0, 0x5, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xbf, &(0x7f0000000180)=""/191, 0x0, 0x6c, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x101, 0xfd}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=[{0x1, 0x3, 0x7, 0x1f}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x3}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x10) 11:10:17 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x2, 0x1, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@null, @bcast, @remote, @netrom, @netrom, @rose, @rose]}, &(0x7f00000000c0)=0x48) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x90) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x9000) 11:10:17 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x500, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x13, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x7, 0x0, 0x5, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xbf, &(0x7f0000000180)=""/191, 0x0, 0x6c, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x101, 0xfd}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=[{0x1, 0x3, 0x7, 0x1f}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x3}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x10) 11:10:17 executing program 1: epoll_create(0x3) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x600, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x100000) 11:10:17 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) (async) 11:10:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x13, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x7, 0x0, 0x5, 0x5, 0x8, 0x2, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xbf, &(0x7f0000000180)=""/191, 0x0, 0x6c, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x101, 0xfd}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=[{0x1, 0x3, 0x7, 0x1f}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x3}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x10) 11:10:17 executing program 1: epoll_create(0x3) 11:10:17 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x2, 0x1, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@null, @bcast, @remote, @netrom, @netrom, @rose, @rose]}, &(0x7f00000000c0)=0x48) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x90000000) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x700, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 2: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff8}, [@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x6, 0x9, 0x5, 0x20, 0x10}]}, &(0x7f0000000080)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x2, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x2f8}, 0x90) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x22100, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x81, 0x28, 0x34, @local, @remote, 0x8000, 0x1, 0x5, 0x100}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x335a80, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x4, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x926a}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @alu={0x4, 0x1, 0x7, 0xb, 0x3, 0x100, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x29, &(0x7f0000000400)=""/41, 0x41000, 0x2, '\x00', r2, 0x27, r3, 0x8, &(0x7f0000000500)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0xf, 0x1, 0x8000}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xfffffffffffffdeb, 0x0}, 0x4c) 11:10:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x28, r2, 0x40d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_OPT={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4840}, 0x80) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:17 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) epoll_create(0x67) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0x8, 0x6528, 0x10, @local, @private0, 0x10, 0x0, 0x3, 0x1f}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x6, 0x0, 0x1, 0xffffffff, 0x30, @local, @private1, 0x8, 0x20, 0xffffffcb, 0x3}}) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x900, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) epoll_create(0x67) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0x8, 0x6528, 0x10, @local, @private0, 0x10, 0x0, 0x3, 0x1f}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x6, 0x0, 0x1, 0xffffffff, 0x30, @local, @private1, 0x8, 0x20, 0xffffffcb, 0x3}}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) (async) epoll_create(0x67) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0x8, 0x6528, 0x10, @local, @private0, 0x10, 0x0, 0x3, 0x1f}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x6, 0x0, 0x1, 0xffffffff, 0x30, @local, @private1, 0x8, 0x20, 0xffffffcb, 0x3}}) (async) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x10000000000000) 11:10:17 executing program 2: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff8}, [@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x6, 0x9, 0x5, 0x20, 0x10}]}, &(0x7f0000000080)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x2, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x2f8}, 0x90) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x22100, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x81, 0x28, 0x34, @local, @remote, 0x8000, 0x1, 0x5, 0x100}}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x335a80, 0x0) (async, rerun: 64) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x4, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x926a}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @alu={0x4, 0x1, 0x7, 0xb, 0x3, 0x100, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x29, &(0x7f0000000400)=""/41, 0x41000, 0x2, '\x00', r2, 0x27, r3, 0x8, &(0x7f0000000500)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0xf, 0x1, 0x8000}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x4}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xfffffffffffffdeb, 0x0}, 0x4c) 11:10:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x28, r2, 0x40d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_OPT={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4840}, 0x80) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x28, r2, 0x40d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_OPT={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4840}, 0x80) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xa00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:17 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) socketpair(0x2, 0x1, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@null, @bcast, @remote, @netrom, @netrom, @rose, @rose]}, &(0x7f00000000c0)=0x48) 11:10:17 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) epoll_create(0x67) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0x8, 0x6528, 0x10, @local, @private0, 0x10, 0x0, 0x3, 0x1f}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x6, 0x0, 0x1, 0xffffffff, 0x30, @local, @private1, 0x8, 0x20, 0xffffffcb, 0x3}}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) (async) epoll_create(0x67) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0x8, 0x6528, 0x10, @local, @private0, 0x10, 0x0, 0x3, 0x1f}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r0, 0x6, 0x0, 0x1, 0xffffffff, 0x30, @local, @private1, 0x8, 0x20, 0xffffffcb, 0x3}}) (async) 11:10:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x9000000000000000) 11:10:17 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xb00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x28, r2, 0x40d, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_CCA_OPT={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4840}, 0x80) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:18 executing program 0: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff1f) 11:10:18 executing program 1: r0 = epoll_create(0x67) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r1, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x4, 0x0, r0, &(0x7f0000000000)={0x3}, r0}) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xc00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 2: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff8}, [@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x6, 0x9, 0x5, 0x20, 0x10}]}, &(0x7f0000000080)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x2, 0x7, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x2f8}, 0x90) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x22100, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x81, 0x28, 0x34, @local, @remote, 0x8000, 0x1, 0x5, 0x100}}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x335a80, 0x0) (async, rerun: 32) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x4, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x926a}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @alu={0x4, 0x1, 0x7, 0xb, 0x3, 0x100, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x29, &(0x7f0000000400)=""/41, 0x41000, 0x2, '\x00', r2, 0x27, r3, 0x8, &(0x7f0000000500)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0xf, 0x1, 0x8000}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x4}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xfffffffffffffdeb, 0x0}, 0x4c) 11:10:18 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:18 executing program 0: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff1f) 11:10:18 executing program 1: r0 = epoll_create(0x67) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r1, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x4, 0x0, r0, &(0x7f0000000000)={0x3}, r0}) 11:10:18 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xd00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:18 executing program 0: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff1f) 11:10:18 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:18 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xe00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xfffffc49) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001800000000002000000024d0f00f4006600000729907800000000ac1e0101070b56ac14140cac1e0101830bbe000000007f000001441439730000000000000008ac14143e00000000831338ac1e0101ac1414bbe0000001ac14142c443411c37f000001000000087f000001000000036401010000000400e000000200000005e000000200000001ffffffff000000094418c91000000008000003ff000000060000000900000fff94040100441c67710000000000001000ac14141d00000002e0000001000000094434ff31ac1414aa0000000200000000000000197f000001ffffffc1ffffffff00000002ac1414bbffffff017f00000100190009000000"]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x21e, 0x1ff, 0x0, 0x92, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="183500000400150000000000000000001832000004000000830ebe6900000000986900000d00000000ad11010000000000182500917e3000000000000000000000008fdac35a91167702e7273fe353bfca158bfdabdf95d02a1f66057a09d193793daa5d8069fad76b7086753ca1a6febcdb231c5a472a4380e6a9da90437bf4f2b044a8753c0aad129b6e2530a15b3f09041869731978552b02ab379c79c510514bae3f6808c1fafee4671ef341d734330cb52b2f646b22eea06e7b6b8f8ce3830f38ae15a6a9ebd56a7e6f472a959ae81bf06a3d2274642d", @ANYRES32=0x1, @ANYBLOB="0000000004000000750a800001000000"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x86, &(0x7f00000000c0)=""/134, 0x41100, 0x42, '\x00', r0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0xf, 0x7ff, 0x2e81}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, r2, 0x1], 0x0, 0x10, 0x6}, 0x90) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x8, &(0x7f0000000980)=[{}], 0x8, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d00)={{r2, 0xffffffffffffffff}, &(0x7f0000000c80), &(0x7f0000000cc0)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x18, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x4, 0x1, 0x2, 0x2, 0xa, 0x80, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @exit]}, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x80, &(0x7f0000000840)=""/128, 0x40f00, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x9, 0x7, 0xfffffffe}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000d40)=[r2, 0xffffffffffffffff, r7], &(0x7f0000000d80)=[{0x5, 0x3, 0xb, 0x3}, {0x5, 0x4, 0x2, 0x8}, {0x1, 0x3, 0xc, 0xb}, {0x5, 0x3, 0xc, 0x9}], 0x10, 0x2}, 0x90) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000500)={0x2, 0x401, [{0x7, 0x0, 0x7}, {0x1000, 0x0, 0xe0c}]}) 11:10:18 executing program 1: r0 = epoll_create(0x67) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r1, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x4, 0x0, r0, &(0x7f0000000000)={0x3}, r0}) 11:10:18 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='1\x00', 0x2) 11:10:18 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xf00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x802c2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x81}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x11) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0x20000800) 11:10:18 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xfffffc49) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x21e, 0x1ff, 0x0, 0x92, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="183500000400150000000000000000001832000004000000830ebe6900000000986900000d00000000ad11010000000000182500917e3000000000000000000000008fdac35a91167702e7273fe353bfca158bfdabdf95d02a1f66057a09d193793daa5d8069fad76b7086753ca1a6febcdb231c5a472a4380e6a9da90437bf4f2b044a8753c0aad129b6e2530a15b3f09041869731978552b02ab379c79c510514bae3f6808c1fafee4671ef341d734330cb52b2f646b22eea06e7b6b8f8ce3830f38ae15a6a9ebd56a7e6f472a959ae81bf06a3d2274642d", @ANYRES32=0x1, @ANYBLOB="0000000004000000750a800001000000"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x86, &(0x7f00000000c0)=""/134, 0x41100, 0x42, '\x00', r0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0xf, 0x7ff, 0x2e81}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, r2, 0x1], 0x0, 0x10, 0x6}, 0x90) (async) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x8, &(0x7f0000000980)=[{}], 0x8, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d00)={{r2, 0xffffffffffffffff}, &(0x7f0000000c80), &(0x7f0000000cc0)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x18, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x4, 0x1, 0x2, 0x2, 0xa, 0x80, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @exit]}, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x80, &(0x7f0000000840)=""/128, 0x40f00, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x9, 0x7, 0xfffffffe}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000d40)=[r2, 0xffffffffffffffff, r7], &(0x7f0000000d80)=[{0x5, 0x3, 0xb, 0x3}, {0x5, 0x4, 0x2, 0x8}, {0x1, 0x3, 0xc, 0xb}, {0x5, 0x3, 0xc, 0x9}], 0x10, 0x2}, 0x90) (async) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000500)={0x2, 0x401, [{0x7, 0x0, 0x7}, {0x1000, 0x0, 0xe0c}]}) 11:10:18 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='1\x00', 0x2) 11:10:18 executing program 3: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x1, 0x6, 0x15, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x700, 0x20, 0x5, 0x3ff}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x802c2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x81}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x11) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0x20000800) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_VENDOR(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x802c2, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x81}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x11) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00'}) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0x20000800) (async) 11:10:18 executing program 1: epoll_create(0x100067) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1100, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 32) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='1\x00', 0x2) (rerun: 32) 11:10:18 executing program 3: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x1, 0x6, 0x15, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x700, 0x20, 0x5, 0x3ff}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xfffffc49) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'erspan0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x21e, 0x1ff, 0x0, 0x92, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="183500000400150000000000000000001832000004000000830ebe6900000000986900000d00000000ad11010000000000182500917e3000000000000000000000008fdac35a91167702e7273fe353bfca158bfdabdf95d02a1f66057a09d193793daa5d8069fad76b7086753ca1a6febcdb231c5a472a4380e6a9da90437bf4f2b044a8753c0aad129b6e2530a15b3f09041869731978552b02ab379c79c510514bae3f6808c1fafee4671ef341d734330cb52b2f646b22eea06e7b6b8f8ce3830f38ae15a6a9ebd56a7e6f472a959ae81bf06a3d2274642d", @ANYRES32=0x1, @ANYBLOB="0000000004000000750a800001000000"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x86, &(0x7f00000000c0)=""/134, 0x41100, 0x42, '\x00', r0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0xf, 0x7ff, 0x2e81}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, r2, 0x1], 0x0, 0x10, 0x6}, 0x90) (async) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x1c, r4, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) (async, rerun: 32) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x8, &(0x7f0000000980)=[{}], 0x8, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d00)={{r2, 0xffffffffffffffff}, &(0x7f0000000c80), &(0x7f0000000cc0)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x18, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x4, 0x1, 0x2, 0x2, 0xa, 0x80, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @exit]}, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x80, &(0x7f0000000840)=""/128, 0x40f00, 0x20, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x9, 0x7, 0xfffffffe}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000d40)=[r2, 0xffffffffffffffff, r7], &(0x7f0000000d80)=[{0x5, 0x3, 0xb, 0x3}, {0x5, 0x4, 0x2, 0x8}, {0x1, 0x3, 0xc, 0xb}, {0x5, 0x3, 0xc, 0x9}], 0x10, 0x2}, 0x90) (async, rerun: 64) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000500)={0x2, 0x401, [{0x7, 0x0, 0x7}, {0x1000, 0x0, 0xe0c}]}) (rerun: 64) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1200, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 1: epoll_create(0x100067) epoll_create(0x100067) (async) 11:10:18 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x802c2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x81}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x11) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0x20000800) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x54}}, 0x20000800) 11:10:18 executing program 0: futex(&(0x7f0000000000)=0x1, 0xc, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1300, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 1: epoll_create(0x100067) 11:10:18 executing program 3: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x1, 0x6, 0x15, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x34}, 0x700, 0x20, 0x5, 0x3ff}}) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:18 executing program 0: futex(&(0x7f0000000000)=0x1, 0xc, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 32) 11:10:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x29, 0xff, 0x20, 0x80000000, 0x19, @ipv4={'\x00', '\xff\xff', @dev}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x20, 0x8010, 0x4, 0x3}}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@mpls_getnetconf={0x34, 0x52, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_IFINDEX={0x8, 0x1, r3}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x4000000) 11:10:18 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x2f, 0xc2, 0x80, 0x3f, 0x83, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x20, 0x80000001}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000700)={0x0, 0x4, 0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0xb, 0x0, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000600)=[{}, {}, {}, {}, {}]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r1, &(0x7f00000004c0)={{}, [@null, @bcast, @bcast, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000540)=0x48) 11:10:18 executing program 1: epoll_create(0x67) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) syz_io_uring_submit(r0, r3, &(0x7f00000000c0)=@IORING_OP_RENAMEAT={0x23, 0x20, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r4}) 11:10:18 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1400, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:18 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'vxcan0\x00', 0x0}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x10001, 0x0}, 0x8) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000680), 0x1c000, 0x0) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r8, 0x40086200, &(0x7f0000000840)=0x1) write$yama_ptrace_scope(r8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x9, &(0x7f0000000300)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x2, 0xb, 0x9, 0x1ff, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0x3, 0xb, 0x5, 0x50, 0xfffffffffffffffc}], &(0x7f0000000380)='syzkaller\x00', 0x200, 0xb8, &(0x7f00000003c0)=""/184, 0x41100, 0x4, '\x00', r1, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x10, 0x8, 0x9}, 0x10, r2, r3, 0x5, &(0x7f00000006c0)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff, r7, r8], &(0x7f0000000700)=[{0x2, 0x1, 0x0, 0x6}, {0x3, 0x4, 0x5, 0x4}, {0x3, 0x5, 0x8, 0x5}, {0x0, 0x5, 0xd, 0x5}, {0x1, 0x4, 0x6, 0x2}], 0x10, 0xfffffff9}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000a80)={0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r3, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000008c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000980), &(0x7f0000000b40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r8, 0xc02064b9, &(0x7f0000000b00)={&(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, r9, 0xfbfbfbfb}) 11:10:18 executing program 0: futex(&(0x7f0000000000)=0x1, 0xc, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) (async) futex(&(0x7f0000000000)=0x1, 0xc, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x29, 0xff, 0x20, 0x80000000, 0x19, @ipv4={'\x00', '\xff\xff', @dev}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x20, 0x8010, 0x4, 0x3}}) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@mpls_getnetconf={0x34, 0x52, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_IFINDEX={0x8, 0x1, r3}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x4000000) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1500, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x2f, 0xc2, 0x80, 0x3f, 0x83, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x20, 0x80000001}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000700)={0x0, 0x4, 0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0xb, 0x0, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000600)=[{}, {}, {}, {}, {}]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r1, &(0x7f00000004c0)={{}, [@null, @bcast, @bcast, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000540)=0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x2f, 0xc2, 0x80, 0x3f, 0x83, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x20, 0x80000001}}) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000700)={0x0, 0x4, 0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0xb, 0x0, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000600)=[{}, {}, {}, {}, {}]}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getpeername$netrom(r1, &(0x7f00000004c0)={{}, [@null, @bcast, @bcast, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000540)=0x48) (async) 11:10:19 executing program 1: epoll_create(0x67) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) syz_io_uring_submit(r0, r3, &(0x7f00000000c0)=@IORING_OP_RENAMEAT={0x23, 0x20, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r4}) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1600, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x6) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x4) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x29, 0xff, 0x20, 0x80000000, 0x19, @ipv4={'\x00', '\xff\xff', @dev}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x20, 0x8010, 0x4, 0x3}}) (async, rerun: 32) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@mpls_getnetconf={0x34, 0x52, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_IFINDEX={0x8, 0x1, r3}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x4000000) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x61e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20, &(0x7f0000000140)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3f}, @tail_call, @alu={0x7, 0x0, 0x1, 0xa, 0x9, 0x1, 0xfffffffffffffff0}, @alu={0x4, 0x1, 0xd, 0x2, 0x0, 0x30, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf68}}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}], &(0x7f0000000240)='GPL\x00', 0x0, 0x12, &(0x7f0000000280)=""/18, 0x41000, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x1, 0x3f995c24, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x90) 11:10:19 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'vxcan0\x00', 0x0}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x10001, 0x0}, 0x8) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000680), 0x1c000, 0x0) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r8, 0x40086200, &(0x7f0000000840)=0x1) (async) write$yama_ptrace_scope(r8, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x9, &(0x7f0000000300)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x2, 0xb, 0x9, 0x1ff, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0x3, 0xb, 0x5, 0x50, 0xfffffffffffffffc}], &(0x7f0000000380)='syzkaller\x00', 0x200, 0xb8, &(0x7f00000003c0)=""/184, 0x41100, 0x4, '\x00', r1, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x10, 0x8, 0x9}, 0x10, r2, r3, 0x5, &(0x7f00000006c0)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff, r7, r8], &(0x7f0000000700)=[{0x2, 0x1, 0x0, 0x6}, {0x3, 0x4, 0x5, 0x4}, {0x3, 0x5, 0x8, 0x5}, {0x0, 0x5, 0xd, 0x5}, {0x1, 0x4, 0x6, 0x2}], 0x10, 0xfffffff9}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000a80)={0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r3, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000008c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000980), &(0x7f0000000b40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r8, 0xc02064b9, &(0x7f0000000b00)={&(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, r9, 0xfbfbfbfb}) 11:10:19 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x2f, 0xc2, 0x80, 0x3f, 0x83, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x20, 0x80000001}}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000700)={0x0, 0x4, 0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0xb, 0x0, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000600)=[{}, {}, {}, {}, {}]}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r1, &(0x7f00000004c0)={{}, [@null, @bcast, @bcast, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000540)=0x48) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x2f, 0xc2, 0x80, 0x3f, 0x83, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x20, 0x80000001}}) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000700)={0x0, 0x4, 0x0, &(0x7f0000000000)=[{}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0xb, 0x0, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x5, 0x0, &(0x7f0000000600)=[{}, {}, {}, {}, {}]}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getpeername$netrom(r1, &(0x7f00000004c0)={{}, [@null, @bcast, @bcast, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000540)=0x48) (async) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1700, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 1: epoll_create(0x67) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180), &(0x7f00000001c0)) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) syz_io_uring_submit(r0, r3, &(0x7f00000000c0)=@IORING_OP_RENAMEAT={0x23, 0x20, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r4}) 11:10:19 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 32) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'vxcan0\x00', 0x0}) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x10001, 0x0}, 0x8) (async, rerun: 32) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x48) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000680), 0x1c000, 0x0) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r8, 0x40086200, &(0x7f0000000840)=0x1) (async, rerun: 64) write$yama_ptrace_scope(r8, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x9, &(0x7f0000000300)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0x2, 0xb, 0x9, 0x1ff, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0x3, 0xb, 0x5, 0x50, 0xfffffffffffffffc}], &(0x7f0000000380)='syzkaller\x00', 0x200, 0xb8, &(0x7f00000003c0)=""/184, 0x41100, 0x4, '\x00', r1, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x10, 0x8, 0x9}, 0x10, r2, r3, 0x5, &(0x7f00000006c0)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff, r7, r8], &(0x7f0000000700)=[{0x2, 0x1, 0x0, 0x6}, {0x3, 0x4, 0x5, 0x4}, {0x3, 0x5, 0x8, 0x5}, {0x0, 0x5, 0xd, 0x5}, {0x1, 0x4, 0x6, 0x2}], 0x10, 0xfffffff9}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000a80)={0x8, 0x0, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r3, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f00000008c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000980), &(0x7f0000000b40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r8, 0xc02064b9, &(0x7f0000000b00)={&(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, r9, 0xfbfbfbfb}) 11:10:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x40d}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_DOWN(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x4001) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x61e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20, &(0x7f0000000140)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3f}, @tail_call, @alu={0x7, 0x0, 0x1, 0xa, 0x9, 0x1, 0xfffffffffffffff0}, @alu={0x4, 0x1, 0xd, 0x2, 0x0, 0x30, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf68}}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}], &(0x7f0000000240)='GPL\x00', 0x0, 0x12, &(0x7f0000000280)=""/18, 0x41000, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x1, 0x3f995c24, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x90) 11:10:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) socketpair(0x6, 0x800, 0x80010000, &(0x7f0000000000)) write$yama_ptrace_scope(r0, &(0x7f0000000080)='3\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1800, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x61e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20, &(0x7f0000000140)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3f}, @tail_call, @alu={0x7, 0x0, 0x1, 0xa, 0x9, 0x1, 0xfffffffffffffff0}, @alu={0x4, 0x1, 0xd, 0x2, 0x0, 0x30, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf68}}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}], &(0x7f0000000240)='GPL\x00', 0x0, 0x12, &(0x7f0000000280)=""/18, 0x41000, 0x20, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x1, 0x3f995c24, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x90) 11:10:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x40d}, 0x14}}, 0x0) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_DOWN(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x4001) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:19 executing program 1: ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000040)='\x01\x00\x00\x00pO\xd7Z\x8d\xba\xd8rE\x83\x94\xe6\x88\x95\xcb\xfcqr\x8a\xd7\xd3*\xd1\x7f\xdfg\x1e\x17\xc8\xee\x15&1e\xed\xdbQ\xc4\xb0\x81\bKL\xe1Uz\x83R\x8a\xd0]') epoll_create(0x67) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000837100000128bd7000fedbdf04000080", @ANYRES32=0x0, @ANYBLOB="0c0001800500060008000000"], 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x4000004) 11:10:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) socketpair(0x6, 0x800, 0x80010000, &(0x7f0000000000)) (async) write$yama_ptrace_scope(r0, &(0x7f0000000080)='3\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) 11:10:19 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000d000000040000006f0000000500006217eed0000700000000000000"]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xffffffffffffff1b, 0x0}, 0x10) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1900, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000002180)) r1 = syz_io_uring_setup(0x757f, &(0x7f0000000040)={0x0, 0x61cb, 0x0, 0x1, 0x17a}, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x4ba0, &(0x7f0000000140)={0x0, 0x22be, 0x200, 0x1, 0x800, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001040)=""/198, &(0x7f0000001140)=0xc6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000240)="fc0c975cbadfea7309e2abe072da26c8a9bfb4f221998ab87b676cbcf402868ecd2cb5b53abf8c657da492182220602a", &(0x7f0000000280)=@udp, 0x1}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='0\x00', 0x2) 11:10:19 executing program 1: ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000040)='\x01\x00\x00\x00pO\xd7Z\x8d\xba\xd8rE\x83\x94\xe6\x88\x95\xcb\xfcqr\x8a\xd7\xd3*\xd1\x7f\xdfg\x1e\x17\xc8\xee\x15&1e\xed\xdbQ\xc4\xb0\x81\bKL\xe1Uz\x83R\x8a\xd0]') (async) epoll_create(0x67) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000837100000128bd7000fedbdf04000080", @ANYRES32=0x0, @ANYBLOB="0c0001800500060008000000"], 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x4000004) 11:10:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) socketpair(0x6, 0x800, 0x80010000, &(0x7f0000000000)) write$yama_ptrace_scope(r0, &(0x7f0000000080)='3\x00', 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) (rerun: 64) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1a00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000d000000040000006f0000000500006217eed0000700000000000000"]) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xffffffffffffff1b, 0x0}, 0x10) 11:10:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x0, 0x40d}, 0x14}}, 0x0) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_DOWN(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x4001) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:19 executing program 1: ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000040)='\x01\x00\x00\x00pO\xd7Z\x8d\xba\xd8rE\x83\x94\xe6\x88\x95\xcb\xfcqr\x8a\xd7\xd3*\xd1\x7f\xdfg\x1e\x17\xc8\xee\x15&1e\xed\xdbQ\xc4\xb0\x81\bKL\xe1Uz\x83R\x8a\xd0]') (async) epoll_create(0x67) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000837100000128bd7000fedbdf04000080", @ANYRES32=0x0, @ANYBLOB="0c0001800500060008000000"], 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x4000004) 11:10:19 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000002180)) r1 = syz_io_uring_setup(0x757f, &(0x7f0000000040)={0x0, 0x61cb, 0x0, 0x1, 0x17a}, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x4ba0, &(0x7f0000000140)={0x0, 0x22be, 0x200, 0x1, 0x800, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001040)=""/198, &(0x7f0000001140)=0xc6) (async, rerun: 32) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000240)="fc0c975cbadfea7309e2abe072da26c8a9bfb4f221998ab87b676cbcf402868ecd2cb5b53abf8c657da492182220602a", &(0x7f0000000280)=@udp, 0x1}, 0x20) (async, rerun: 32) socket$inet_tcp(0x2, 0x1, 0x0) (async) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='0\x00', 0x2) 11:10:19 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000d000000040000006f0000000500006217eed0000700000000000000"]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xffffffffffffff1b, 0x0}, 0x10) (rerun: 64) 11:10:19 executing program 1: epoll_create(0x67) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="eab09d57198148601cb734c18299f879", 0x10) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1b00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x5b, 0x20, 0xfffffffa, 0x4, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0xffef, 0x4, 0xffffffc1}}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', r0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0x6c, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000180000000400000000000000070b00003cf206000101000004000000030000007fd10800faffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xb9, &(0x7f0000000200)=""/185, 0x40f00, 0x20, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x9}, 0x8, 0x10, 0x0, 0x0, 0xc8a7, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x8, 0x4}, {0x2, 0xc933, 0xa, 0x7}, {0x0, 0x5, 0x9, 0xb}, {0x1, 0x2, 0x5, 0x8}, {0x2, 0x3, 0x0, 0x6}, {0x1, 0x4, 0x6, 0xb}, {0x4, 0x2, 0x7, 0xa}, {0x3, 0x5, 0xc, 0x1}], 0x10, 0x1}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440), 0x106}}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x4680, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', r0, r1, 0x2, 0x4, 0x5}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) 11:10:19 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) 11:10:19 executing program 1: epoll_create(0x67) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="eab09d57198148601cb734c18299f879", 0x10) (async) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="eab09d57198148601cb734c18299f879", 0x10) 11:10:19 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000002180)) (async) r1 = syz_io_uring_setup(0x757f, &(0x7f0000000040)={0x0, 0x61cb, 0x0, 0x1, 0x17a}, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x4ba0, &(0x7f0000000140)={0x0, 0x22be, 0x200, 0x1, 0x800, 0x0, r1}, &(0x7f00000001c0), &(0x7f0000000200)) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001040)=""/198, &(0x7f0000001140)=0xc6) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000240)="fc0c975cbadfea7309e2abe072da26c8a9bfb4f221998ab87b676cbcf402868ecd2cb5b53abf8c657da492182220602a", &(0x7f0000000280)=@udp, 0x1}, 0x20) (async) socket$inet_tcp(0x2, 0x1, 0x0) write$yama_ptrace_scope(0xffffffffffffffff, &(0x7f0000000000)='0\x00', 0x2) 11:10:19 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xc04d7311, 0x0}, 0xfffffffffffffeac) 11:10:19 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) (async) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1c00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 1938.837787][T28019] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 11:10:19 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x5b, 0x20, 0xfffffffa, 0x4, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0xffef, 0x4, 0xffffffc1}}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', r0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0x6c, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000180000000400000000000000070b00003cf206000101000004000000030000007fd10800faffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xb9, &(0x7f0000000200)=""/185, 0x40f00, 0x20, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x9}, 0x8, 0x10, 0x0, 0x0, 0xc8a7, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x8, 0x4}, {0x2, 0xc933, 0xa, 0x7}, {0x0, 0x5, 0x9, 0xb}, {0x1, 0x2, 0x5, 0x8}, {0x2, 0x3, 0x0, 0x6}, {0x1, 0x4, 0x6, 0xb}, {0x4, 0x2, 0x7, 0xa}, {0x3, 0x5, 0xc, 0x1}], 0x10, 0x1}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440), 0x106}}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x4680, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', r0, r1, 0x2, 0x4, 0x5}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x5b, 0x20, 0xfffffffa, 0x4, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0xffef, 0x4, 0xffffffc1}}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', r0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0x6c, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000180000000400000000000000070b00003cf206000101000004000000030000007fd10800faffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xb9, &(0x7f0000000200)=""/185, 0x40f00, 0x20, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x9}, 0x8, 0x10, 0x0, 0x0, 0xc8a7, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x8, 0x4}, {0x2, 0xc933, 0xa, 0x7}, {0x0, 0x5, 0x9, 0xb}, {0x1, 0x2, 0x5, 0x8}, {0x2, 0x3, 0x0, 0x6}, {0x1, 0x4, 0x6, 0xb}, {0x4, 0x2, 0x7, 0xa}, {0x3, 0x5, 0xc, 0x1}], 0x10, 0x1}, 0x90) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x4680, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', r0, r1, 0x2, 0x4, 0x5}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) (async) 11:10:19 executing program 1: epoll_create(0x67) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="eab09d57198148601cb734c18299f879", 0x10) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1d00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x44) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280), 0x40ac01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x11, 0x2a, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xe9a7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0x9, 0x4, 0x7, 0x6, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff3592}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x1a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000012c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001340)=[{0x0, 0x5, 0x8, 0x1}], 0x10, 0x16}, 0x90) 11:10:19 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xc04d7311, 0x0}, 0xfffffffffffffeac) 11:10:19 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0x5b, 0x20, 0xfffffffa, 0x4, @mcast2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x20, 0xffef, 0x4, 0xffffffc1}}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3, '\x00', r0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0x6c, &(0x7f0000000140)=ANY=[@ANYBLOB="9500000000000000180000000400000000000000070b00003cf206000101000004000000030000007fd10800faffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0xb9, &(0x7f0000000200)=""/185, 0x40f00, 0x20, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x9}, 0x8, 0x10, 0x0, 0x0, 0xc8a7, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x8, 0x4}, {0x2, 0xc933, 0xa, 0x7}, {0x0, 0x5, 0x9, 0xb}, {0x1, 0x2, 0x5, 0x8}, {0x2, 0x3, 0x0, 0x6}, {0x1, 0x4, 0x6, 0xb}, {0x4, 0x2, 0x7, 0xa}, {0x3, 0x5, 0xc, 0x1}], 0x10, 0x1}, 0x90) socket$inet6_udplite(0xa, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440), 0x106}}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x4680, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', r0, r1, 0x2, 0x4, 0x5}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) 11:10:19 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x44) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280), 0x40ac01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x11, 0x2a, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xe9a7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0x9, 0x4, 0x7, 0x6, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff3592}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x1a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000012c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001340)=[{0x0, 0x5, 0x8, 0x1}], 0x10, 0x16}, 0x90) 11:10:19 executing program 1: epoll_create(0x67) r0 = getpgid(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 11:10:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7fffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:19 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1e00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:19 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x3dfd31f3615b35c9) 11:10:19 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xc04d7311, 0x0}, 0xfffffffffffffeac) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xc04d7311, 0x0}, 0xfffffffffffffeac) (async) 11:10:19 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x44) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280), 0x40ac01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x11, 0x2a, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xe9a7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0x9, 0x4, 0x7, 0x6, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff3592}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x1a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000012c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001340)=[{0x0, 0x5, 0x8, 0x1}], 0x10, 0x16}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x44) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280), 0x40ac01, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x11, 0x2a, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xe9a7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x0, 0x9, 0x4, 0x7, 0x6, 0x8}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff3592}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x10000, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x1a, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000012c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001300)={0x0, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001340)=[{0x0, 0x5, 0x8, 0x1}], 0x10, 0x16}, 0x90) (async) 11:10:20 executing program 1: epoll_create(0x67) r0 = getpgid(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) epoll_create(0x67) (async) getpgid(0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1f00, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x7e28cc6d812d78ea, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x2a9485fd730fe8e8, 0x0}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=r1, 0x24, 0x1, 0x401, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:20 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7fffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7fffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:20 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x3dfd31f3615b35c9) 11:10:20 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x48) 11:10:20 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x7e28cc6d812d78ea, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x2a9485fd730fe8e8, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x2a9485fd730fe8e8, 0x0}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=r1, 0x24, 0x1, 0x401, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2100, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 1: epoll_create(0x67) (async, rerun: 32) r0 = getpgid(0x0) (rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 11:10:20 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x48) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2200, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x3dfd31f3615b35c9) 11:10:20 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x7e28cc6d812d78ea, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x7e28cc6d812d78ea, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0x2a9485fd730fe8e8, 0x0}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=r1, 0x24, 0x1, 0x401, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:20 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7fffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x9}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:20 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x48) 11:10:20 executing program 1: ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)={0x7ff, 0x1, 0xffffffff}) epoll_create(0xdffffffd) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2300, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xffffffb9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x80, 0x557d, 0x0, @loopback, @private2, 0x10, 0x7, 0x3a, 0x7}}) 11:10:20 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:20 executing program 3: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044000) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @bcast, @netrom, @null, @remote, @bcast, @null]}, &(0x7f0000000080)=0x48) 11:10:20 executing program 0: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x15, 0x200202) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x39, 0xa, 0xf, 0x14, 0x8, 0x5, 0x5, 0x3f}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x5, 'syz0\x00', @bcast, 0x0, 0x2, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @bcast]}) 11:10:20 executing program 3: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044000) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @bcast, @netrom, @null, @remote, @bcast, @null]}, &(0x7f0000000080)=0x48) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:20 executing program 1: ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)={0x7ff, 0x1, 0xffffffff}) (async) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)={0x7ff, 0x1, 0xffffffff}) epoll_create(0xdffffffd) 11:10:20 executing program 0: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x15, 0x200202) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x39, 0xa, 0xf, 0x14, 0x8, 0x5, 0x5, 0x3f}}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x5, 'syz0\x00', @bcast, 0x0, 0x2, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @bcast]}) (rerun: 64) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xffffffb9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x80, 0x557d, 0x0, @loopback, @private2, 0x10, 0x7, 0x3a, 0x7}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xffffffb9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x80, 0x557d, 0x0, @loopback, @private2, 0x10, 0x7, 0x3a, 0x7}}) (async) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:20 executing program 0: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x15, 0x200202) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x39, 0xa, 0xf, 0x14, 0x8, 0x5, 0x5, 0x3f}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x5, 'syz0\x00', @bcast, 0x0, 0x2, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @bcast]}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) syz_open_dev$rtc(&(0x7f0000000040), 0x15, 0x200202) (async) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x39, 0xa, 0xf, 0x14, 0x8, 0x5, 0x5, 0x3f}}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x5, 'syz0\x00', @bcast, 0x0, 0x2, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @bcast]}) (async) 11:10:20 executing program 1: ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)={0x7ff, 0x1, 0xffffffff}) epoll_create(0xdffffffd) (async) epoll_create(0xdffffffd) 11:10:20 executing program 3: sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044000) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @bcast, @netrom, @null, @remote, @bcast, @null]}, &(0x7f0000000080)=0x48) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xffffffb9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x80, 0x557d, 0x0, @loopback, @private2, 0x10, 0x7, 0x3a, 0x7}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0xffffffb9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3f, 0x80, 0x557d, 0x0, @loopback, @private2, 0x10, 0x7, 0x3a, 0x7}}) (async) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x3000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x11) syz_open_dev$dri(&(0x7f0000000080), 0xfff, 0x80000) 11:10:20 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40002, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000180)={{0x3, @netrom}, [@default, @remote, @rose, @null, @netrom, @rose, @rose, @rose]}, &(0x7f0000000000)=0x48) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000140), 0x8) 11:10:20 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xfffffffffffffffe, 0x1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:20 executing program 1: epoll_create(0x67) epoll_create(0xffff0001) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x4000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x11) syz_open_dev$dri(&(0x7f0000000080), 0xfff, 0x80000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x11) (async) syz_open_dev$dri(&(0x7f0000000080), 0xfff, 0x80000) (async) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c02, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 11:10:20 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xfffffffffffffffe, 0x1) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 64) 11:10:20 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40002, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000180)={{0x3, @netrom}, [@default, @remote, @rose, @null, @netrom, @rose, @rose, @rose]}, &(0x7f0000000000)=0x48) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000140), 0x8) (async) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000140), 0x8) 11:10:20 executing program 1: epoll_create(0x67) (async) epoll_create(0xffff0001) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c02, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x5000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x11) syz_open_dev$dri(&(0x7f0000000080), 0xfff, 0x80000) (async) syz_open_dev$dri(&(0x7f0000000080), 0xfff, 0x80000) 11:10:20 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x6000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:20 executing program 1: epoll_create(0x67) (async) epoll_create(0xffff0001) 11:10:20 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40002, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) getpeername$netrom(r1, &(0x7f0000000180)={{0x3, @netrom}, [@default, @remote, @rose, @null, @netrom, @rose, @rose, @rose]}, &(0x7f0000000000)=0x48) (async) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) (async) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000140), 0x8) 11:10:20 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 32) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xfffffffffffffffe, 0x1) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:20 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x7, 0x20, 0x20, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x8, 0x5, 0x8001}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:20 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c02, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c02, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x7000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x7, 0x20, 0x20, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x8, 0x5, 0x8001}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x7, 0x20, 0x20, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x8, 0x5, 0x8001}}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:21 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 11:10:21 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x40, 0x80, 0x0, 0xffff0001, {{0x24, 0x4, 0x0, 0x3a, 0x90, 0x68, 0x0, 0xfa, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x39}, {[@rr={0x7, 0x2b, 0x95, [@remote, @loopback, @local, @multicast2, @broadcast, @loopback, @empty, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x44, 0x12, "f0c576aa1080f9472710e7cad8a07d54"}, @rr={0x7, 0x1f, 0xd4, [@multicast2, @private=0xa010101, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x3a}, @private=0xa010100]}, @cipso={0x86, 0x1d, 0x1, [{0x2, 0xc, "0ab993dfb880bd64859d"}, {0x5, 0xb, "fb27c1651239c92ed4"}]}, @end]}}}}}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000000)) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x80000001, 0x3f, 0x202}) 11:10:21 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x8000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/130, 0x82, 0x12000, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 11:10:21 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 11:10:21 executing program 5: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x7, 0x20, 0x20, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x8, 0x5, 0x8001}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x7, 0x20, 0x20, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x700, 0x8, 0x5, 0x8001}}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:21 executing program 1: epoll_create(0x67) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0xcb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 11:10:21 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/130, 0x82, 0x12000, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 11:10:21 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x9000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x40, 0x80, 0x0, 0xffff0001, {{0x24, 0x4, 0x0, 0x3a, 0x90, 0x68, 0x0, 0xfa, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x39}, {[@rr={0x7, 0x2b, 0x95, [@remote, @loopback, @local, @multicast2, @broadcast, @loopback, @empty, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x44, 0x12, "f0c576aa1080f9472710e7cad8a07d54"}, @rr={0x7, 0x1f, 0xd4, [@multicast2, @private=0xa010101, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x3a}, @private=0xa010100]}, @cipso={0x86, 0x1d, 0x1, [{0x2, 0xc, "0ab993dfb880bd64859d"}, {0x5, 0xb, "fb27c1651239c92ed4"}]}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x40, 0x80, 0x0, 0xffff0001, {{0x24, 0x4, 0x0, 0x3a, 0x90, 0x68, 0x0, 0xfa, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x39}, {[@rr={0x7, 0x2b, 0x95, [@remote, @loopback, @local, @multicast2, @broadcast, @loopback, @empty, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x44, 0x12, "f0c576aa1080f9472710e7cad8a07d54"}, @rr={0x7, 0x1f, 0xd4, [@multicast2, @private=0xa010101, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x3a}, @private=0xa010100]}, @cipso={0x86, 0x1d, 0x1, [{0x2, 0xc, "0ab993dfb880bd64859d"}, {0x5, 0xb, "fb27c1651239c92ed4"}]}, @end]}}}}}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000000)) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x80000001, 0x3f, 0x202}) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0xcb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 11:10:21 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x7f98, 0x40, 0x3, 0x8, {{0x30, 0x4, 0x0, 0x17, 0xc0, 0x68, 0x0, 0x8, 0x2f, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0xc, 0x7f, 0x3, 0x8, [{@loopback, 0x5}]}, @timestamp_prespec={0x44, 0x14, 0x4f, 0x3, 0x7, [{@multicast1, 0xdcd}, {@dev={0xac, 0x14, 0x14, 0x41}}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x43, 0xffffffffffffffff, [{0x1, 0x2}, {0x1, 0xf, "b89872acefd1424ce6284481e3"}, {0x6, 0x6, "b07d8e12"}, {0x6, 0xd, "87918175f82c335096dd50"}, {0x5, 0x3, "93"}, {0x2, 0x9, "a0497d373a0857"}, {0x6, 0xd, "e1063a9e8a96e4782efc74"}]}, @timestamp_addr={0x44, 0x44, 0x92, 0x1, 0xd, [{@multicast2, 0x7}, {@local, 0x100}, {@broadcast, 0x20}, {@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x7}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x101}, {@local, 0x5}]}]}}}}}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x10, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@generic={0x3, 0xd, 0x8, 0x2, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000b00)=""/4096, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x10, 0xffff53bf, 0xdcb}, 0x10, 0x1ad1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x0, 0x9, 0x7, 0x8, 0x80}, @jmp={0x5, 0x1, 0xa, 0x5, 0x9, 0x1, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x8, 0x1, 0x0, r1}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x6c, &(0x7f00000000c0)=""/108, 0x40f00, 0x0, '\x00', r2, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x3, 0x6, 0x2}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000500)=[0xffffffffffffffff], 0x0, 0x10, 0x8000}, 0x90) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000040)=""/130, 0x82, 0x12000, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xa000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 1: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000780)={0x0, 0xa, 0x0, &(0x7f0000000080)=[{0x80000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x2, 0x0, &(0x7f0000000700)=[{}, {}], 0x1, 0x0, &(0x7f0000000740)=[{}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000008c0)={r0, &(0x7f0000000800), &(0x7f0000000840)}) epoll_create(0x67) epoll_create(0x3ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x27, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)="8d30f30e25fc4015c830b23a897c2ebe414016a1451c8624d98d916593189a", 0x1f, 0x854, 0x1}) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000)=0x4, 0x4) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0xcb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e23, 0xcb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) (async) 11:10:21 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x7f98, 0x40, 0x3, 0x8, {{0x30, 0x4, 0x0, 0x17, 0xc0, 0x68, 0x0, 0x8, 0x2f, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0xc, 0x7f, 0x3, 0x8, [{@loopback, 0x5}]}, @timestamp_prespec={0x44, 0x14, 0x4f, 0x3, 0x7, [{@multicast1, 0xdcd}, {@dev={0xac, 0x14, 0x14, 0x41}}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x43, 0xffffffffffffffff, [{0x1, 0x2}, {0x1, 0xf, "b89872acefd1424ce6284481e3"}, {0x6, 0x6, "b07d8e12"}, {0x6, 0xd, "87918175f82c335096dd50"}, {0x5, 0x3, "93"}, {0x2, 0x9, "a0497d373a0857"}, {0x6, 0xd, "e1063a9e8a96e4782efc74"}]}, @timestamp_addr={0x44, 0x44, 0x92, 0x1, 0xd, [{@multicast2, 0x7}, {@local, 0x100}, {@broadcast, 0x20}, {@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x7}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x101}, {@local, 0x5}]}]}}}}}) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x10, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@generic={0x3, 0xd, 0x8, 0x2, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000b00)=""/4096, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x10, 0xffff53bf, 0xdcb}, 0x10, 0x1ad1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x0, 0x9, 0x7, 0x8, 0x80}, @jmp={0x5, 0x1, 0xa, 0x5, 0x9, 0x1, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x8, 0x1, 0x0, r1}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x6c, &(0x7f00000000c0)=""/108, 0x40f00, 0x0, '\x00', r2, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x3, 0x6, 0x2}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000500)=[0xffffffffffffffff], 0x0, 0x10, 0x8000}, 0x90) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xb000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000)=0x4, 0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000)=0x4, 0x4) (async) 11:10:21 executing program 1: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000780)={0x0, 0xa, 0x0, &(0x7f0000000080)=[{0x80000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x2, 0x0, &(0x7f0000000700)=[{}, {}], 0x1, 0x0, &(0x7f0000000740)=[{}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000008c0)={r0, &(0x7f0000000800), &(0x7f0000000840)}) (async) epoll_create(0x67) (async) epoll_create(0x3ff) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x27, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)="8d30f30e25fc4015c830b23a897c2ebe414016a1451c8624d98d916593189a", 0x1f, 0x854, 0x1}) 11:10:21 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x40, 0x80, 0x0, 0xffff0001, {{0x24, 0x4, 0x0, 0x3a, 0x90, 0x68, 0x0, 0xfa, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x39}, {[@rr={0x7, 0x2b, 0x95, [@remote, @loopback, @local, @multicast2, @broadcast, @loopback, @empty, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x44, 0x12, "f0c576aa1080f9472710e7cad8a07d54"}, @rr={0x7, 0x1f, 0xd4, [@multicast2, @private=0xa010101, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @dev={0xac, 0x14, 0x14, 0x3a}, @private=0xa010100]}, @cipso={0x86, 0x1d, 0x1, [{0x2, 0xc, "0ab993dfb880bd64859d"}, {0x5, 0xb, "fb27c1651239c92ed4"}]}, @end]}}}}}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000000)) (async) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x80000001, 0x3f, 0x202}) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x7fff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x1}], 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0xc7b, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1117}}}, 0x38) 11:10:21 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x7f98, 0x40, 0x3, 0x8, {{0x30, 0x4, 0x0, 0x17, 0xc0, 0x68, 0x0, 0x8, 0x2f, 0x0, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0xc, 0x7f, 0x3, 0x8, [{@loopback, 0x5}]}, @timestamp_prespec={0x44, 0x14, 0x4f, 0x3, 0x7, [{@multicast1, 0xdcd}, {@dev={0xac, 0x14, 0x14, 0x41}}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x43, 0xffffffffffffffff, [{0x1, 0x2}, {0x1, 0xf, "b89872acefd1424ce6284481e3"}, {0x6, 0x6, "b07d8e12"}, {0x6, 0xd, "87918175f82c335096dd50"}, {0x5, 0x3, "93"}, {0x2, 0x9, "a0497d373a0857"}, {0x6, 0xd, "e1063a9e8a96e4782efc74"}]}, @timestamp_addr={0x44, 0x44, 0x92, 0x1, 0xd, [{@multicast2, 0x7}, {@local, 0x100}, {@broadcast, 0x20}, {@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x7}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x101}, {@local, 0x5}]}]}}}}}) (async) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x10, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@generic={0x3, 0xd, 0x8, 0x2, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000b00)=""/4096, 0x41000, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x10, 0xffff53bf, 0xdcb}, 0x10, 0x1ad1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x10, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x0, 0x9, 0x7, 0x8, 0x80}, @jmp={0x5, 0x1, 0xa, 0x5, 0x9, 0x1, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x8, 0x1, 0x0, r1}, @exit], &(0x7f0000000080)='syzkaller\x00', 0x7ff, 0x6c, &(0x7f00000000c0)=""/108, 0x40f00, 0x0, '\x00', r2, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x3, 0x6, 0x2}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000000500)=[0xffffffffffffffff], 0x0, 0x10, 0x8000}, 0x90) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000000)=0x4, 0x4) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xc000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 1: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000780)={0x0, 0xa, 0x0, &(0x7f0000000080)=[{0x80000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x6, 0x0, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x2, 0x0, &(0x7f0000000700)=[{}, {}], 0x1, 0x0, &(0x7f0000000740)=[{}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000008c0)={r0, &(0x7f0000000800), &(0x7f0000000840)}) (async) epoll_create(0x67) epoll_create(0x3ff) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_SEND={0x1a, 0x27, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)="8d30f30e25fc4015c830b23a897c2ebe414016a1451c8624d98d916593189a", 0x1f, 0x854, 0x1}) 11:10:21 executing program 1: epoll_create(0x67) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r0, 0x1, 0x4002) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) syz_io_uring_setup(0xb40, &(0x7f0000000080)={0x0, 0x1e62, 0x2, 0x1, 0x26c}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4004, @fd, 0x10001, 0x0, 0x0, 0x1c, 0x1, {0x3}}) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x7fff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x1}], 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0xc7b, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1117}}}, 0x38) 11:10:21 executing program 2: syz_open_dev$rtc(&(0x7f0000000840), 0x0, 0x200281) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10080, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockname$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@null, @remote, @null, @netrom, @null, @bcast, @null, @default]}, &(0x7f0000000080)=0x48) socket$inet6_sctp(0xa, 0x1, 0x84) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xd000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xe000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:21 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) (async, rerun: 32) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 32) getsockname$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@null, @remote, @null, @netrom, @null, @bcast, @null, @default]}, &(0x7f0000000080)=0x48) (async) socket$inet6_sctp(0xa, 0x1, 0x84) 11:10:21 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x8}, 0x8) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x7fff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x1}], 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0xc7b, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1117}}}, 0x38) 11:10:21 executing program 2: syz_open_dev$rtc(&(0x7f0000000840), 0x0, 0x200281) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10080, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 11:10:21 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000003000000000000000900000018110000", @ANYRES32=0x1, @ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xba, &(0x7f0000000100)=""/186, 0x41000, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x0, 0x7ff, 0x4}, 0x10, 0xf2fb, r0, 0x2, 0x0, &(0x7f0000000240)=[{0x4, 0x1, 0x5, 0xb}, {0x4, 0x4, 0xf, 0x9}], 0x10, 0xffffffff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340)="facf5708e862de5a8e70546834502f4431f3ba2ba3fa061c1493ab3b298b4ed10c9d55203adbf764410d4659edcbf8c626bc82077ae7ff33721dc6279eee8e92f3a0f4774a8d31c788a31cd69d3ce28ea4d4a98cc27c66117a1f19a9ac84480f11a88633c84ddb5ef9f50954bd8e426ff18de547a9f0c3c0d8664c91745aecb719a73d", &(0x7f0000000400)=@udp=r1, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%ps \x00'}, 0x20) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000480)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f00000004c0)='GPL\x00', 0xfff, 0xe, &(0x7f0000000500)=""/14, 0x41100, 0x4e, '\x00', r2, 0x1b, r0, 0x8, &(0x7f0000000580)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x2, 0x0, 0x3ff}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0)=[r1, r3, r0, r0, r4], &(0x7f0000000700)=[{0x0, 0x3, 0x6, 0xa}, {0x2, 0x3, 0xa, 0x1}], 0x10, 0x1}, 0x90) 11:10:21 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xf000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 1: epoll_create(0x67) (async) socket$inet6_sctp(0xa, 0x0, 0x84) (async) r0 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r0, 0x1, 0x4002) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) syz_io_uring_setup(0xb40, &(0x7f0000000080)={0x0, 0x1e62, 0x2, 0x1, 0x26c}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4004, @fd, 0x10001, 0x0, 0x0, 0x1c, 0x1, {0x3}}) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x10000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockname$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@null, @remote, @null, @netrom, @null, @bcast, @null, @default]}, &(0x7f0000000080)=0x48) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockname$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@null, @remote, @null, @netrom, @null, @bcast, @null, @default]}, &(0x7f0000000080)=0x48) (async) socket$inet6_sctp(0xa, 0x1, 0x84) (async) 11:10:22 executing program 2: syz_open_dev$rtc(&(0x7f0000000840), 0x0, 0x200281) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10080, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 11:10:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000003000000000000000900000018110000", @ANYRES32=0x1, @ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xba, &(0x7f0000000100)=""/186, 0x41000, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x0, 0x7ff, 0x4}, 0x10, 0xf2fb, r0, 0x2, 0x0, &(0x7f0000000240)=[{0x4, 0x1, 0x5, 0xb}, {0x4, 0x4, 0xf, 0x9}], 0x10, 0xffffffff}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340)="facf5708e862de5a8e70546834502f4431f3ba2ba3fa061c1493ab3b298b4ed10c9d55203adbf764410d4659edcbf8c626bc82077ae7ff33721dc6279eee8e92f3a0f4774a8d31c788a31cd69d3ce28ea4d4a98cc27c66117a1f19a9ac84480f11a88633c84ddb5ef9f50954bd8e426ff18de547a9f0c3c0d8664c91745aecb719a73d", &(0x7f0000000400)=@udp=r1, 0x1}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%ps \x00'}, 0x20) (async, rerun: 32) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r4, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000480)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f00000004c0)='GPL\x00', 0xfff, 0xe, &(0x7f0000000500)=""/14, 0x41100, 0x4e, '\x00', r2, 0x1b, r0, 0x8, &(0x7f0000000580)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x2, 0x0, 0x3ff}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0)=[r1, r3, r0, r0, r4], &(0x7f0000000700)=[{0x0, 0x3, 0x6, 0xa}, {0x2, 0x3, 0xa, 0x1}], 0x10, 0x1}, 0x90) (rerun: 64) 11:10:22 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) 11:10:22 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x11000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) 11:10:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000003000000000000000900000018110000", @ANYRES32=0x1, @ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xba, &(0x7f0000000100)=""/186, 0x41000, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x0, 0x7ff, 0x4}, 0x10, 0xf2fb, r0, 0x2, 0x0, &(0x7f0000000240)=[{0x4, 0x1, 0x5, 0xb}, {0x4, 0x4, 0xf, 0x9}], 0x10, 0xffffffff}, 0x90) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340)="facf5708e862de5a8e70546834502f4431f3ba2ba3fa061c1493ab3b298b4ed10c9d55203adbf764410d4659edcbf8c626bc82077ae7ff33721dc6279eee8e92f3a0f4774a8d31c788a31cd69d3ce28ea4d4a98cc27c66117a1f19a9ac84480f11a88633c84ddb5ef9f50954bd8e426ff18de547a9f0c3c0d8664c91745aecb719a73d", &(0x7f0000000400)=@udp=r1, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%ps \x00'}, 0x20) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000480)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f00000004c0)='GPL\x00', 0xfff, 0xe, &(0x7f0000000500)=""/14, 0x41100, 0x4e, '\x00', r2, 0x1b, r0, 0x8, &(0x7f0000000580)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x2, 0x0, 0x3ff}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0)=[r1, r3, r0, r0, r4], &(0x7f0000000700)=[{0x0, 0x3, 0x6, 0xa}, {0x2, 0x3, 0xa, 0x1}], 0x10, 0x1}, 0x90) 11:10:22 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x80, 0x5, 0x3, {{0xa, 0x4, 0x1, 0x4, 0x28, 0x65, 0x0, 0x8, 0x29, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x14, 0xc6, 0x1, 0x2, [{@rand_addr=0x64010102, 0x345b}, {@local, 0xe0e4}]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe}], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x657e0d742df43e95, 0x20, '\x00', r0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x6316, 0xe8a}, 0x10, 0xffffffffffffffff}, 0x90) 11:10:22 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) (async) 11:10:22 executing program 1: epoll_create(0x67) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r0, 0x1, 0x4002) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) syz_io_uring_setup(0xb40, &(0x7f0000000080)={0x0, 0x1e62, 0x2, 0x1, 0x26c}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4004, @fd, 0x10001, 0x0, 0x0, 0x1c, 0x1, {0x3}}) epoll_create(0x67) (async) socket$inet6_sctp(0xa, 0x0, 0x84) (async) syz_clone(0x80, &(0x7f0000000440)="acffc7b846d24f9a98aa37d919920b28015b3f0f6adaba37cc8d9a52fb0c7f6674e4b0895ac4d6d435077adc72d7acd86eb5dd2660409f1fe4c080d34161cd08f4f45c9fede7722c26a6ef07db657e9c0f6a55c38a4eabeda9f0", 0x5a, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="decd13252322b0e2b4c3478bcbf06a47649ad91ad0e4d160df525a36ed3880d6c35e0b798b38fca0291a7dd4ccd1332c47088434ec31390f4dd71021a8e0bc42acd0eb293856148490f8b5ffe833ad8c7e3deb1df7cb1a2c002cba1383d82f6689e4f5953a2e15e9265f096669322646a5133c9effc7c27f6e731e217cb9c5769c037be37980a52ac9913b3118b6d04ad37594e64a0f8653da9f82235e74f828c5200de4019432e174a846587db95f8afa7df2f7") (async) ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, r0, 0x1, 0x4002) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async) syz_io_uring_setup(0xb40, &(0x7f0000000080)={0x0, 0x1e62, 0x2, 0x1, 0x26c}, &(0x7f0000000100), &(0x7f0000000140)) (async) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x4004, @fd, 0x10001, 0x0, 0x0, 0x1c, 0x1, {0x3}}) (async) 11:10:22 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) 11:10:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0xffffffff, 0x4) syz_open_dev$radio(&(0x7f0000000080), 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:22 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x80, 0x5, 0x3, {{0xa, 0x4, 0x1, 0x4, 0x28, 0x65, 0x0, 0x8, 0x29, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x14, 0xc6, 0x1, 0x2, [{@rand_addr=0x64010102, 0x345b}, {@local, 0xe0e4}]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe}], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x657e0d742df43e95, 0x20, '\x00', r0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x6316, 0xe8a}, 0x10, 0xffffffffffffffff}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x80, 0x5, 0x3, {{0xa, 0x4, 0x1, 0x4, 0x28, 0x65, 0x0, 0x8, 0x29, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x14, 0xc6, 0x1, 0x2, [{@rand_addr=0x64010102, 0x345b}, {@local, 0xe0e4}]}]}}}}}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe}], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x657e0d742df43e95, 0x20, '\x00', r0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x6316, 0xe8a}, 0x10, 0xffffffffffffffff}, 0x90) (async) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x12000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x80, 0x5, 0x3, {{0xa, 0x4, 0x1, 0x4, 0x28, 0x65, 0x0, 0x8, 0x29, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x14, 0xc6, 0x1, 0x2, [{@rand_addr=0x64010102, 0x345b}, {@local, 0xe0e4}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x1, 0x80, 0x5, 0x3, {{0xa, 0x4, 0x1, 0x4, 0x28, 0x65, 0x0, 0x8, 0x29, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x14, 0xc6, 0x1, 0x2, [{@rand_addr=0x64010102, 0x345b}, {@local, 0xe0e4}]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe}], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x657e0d742df43e95, 0x20, '\x00', r0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0xd, 0x6316, 0xe8a}, 0x10, 0xffffffffffffffff}, 0x90) 11:10:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0xffffffff, 0x4) (async) syz_open_dev$radio(&(0x7f0000000080), 0x0, 0x2) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:22 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x13000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r0) 11:10:22 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e}, {}, {}, [@generic={0x81, 0x3, 0x0, 0x5, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0xfffffffe, 0x28, &(0x7f00000000c0)=""/40, 0x0, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x6, 0xffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:22 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x14000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0xffffffff, 0x4) syz_open_dev$radio(&(0x7f0000000080), 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0xffffffff, 0x4) (async) syz_open_dev$radio(&(0x7f0000000080), 0x0, 0x2) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 11:10:22 executing program 3: syz_io_uring_setup(0x6b07, &(0x7f0000000100)={0x0, 0xd451, 0x800, 0x3, 0x1a2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x1a13, &(0x7f0000000200)={0x0, 0x842b, 0x20, 0x0, 0x2e4}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000000), 0x4) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf250700000006001c00060000000600020000000000050013000400000006001d00020000000c001000ffff00000000000005000600030000000600010004000000050822000100000006001c0001040000"], 0x60}, 0x1, 0x0, 0x0, 0x98e6479302e7b978}, 0x20040080) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)="7e0d7f7f012faffe284367510d201fa2a14008c7b4ceb88a553bcec82caba2af295d2fff8b2e18f5", &(0x7f0000000080)=@tcp}, 0x20) 11:10:22 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan0\x00'}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:22 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e}, {}, {}, [@generic={0x81, 0x3, 0x0, 0x5, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0xfffffffe, 0x28, &(0x7f00000000c0)=""/40, 0x0, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x6, 0xffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e}, {}, {}, [@generic={0x81, 0x3, 0x0, 0x5, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0xfffffffe, 0x28, &(0x7f00000000c0)=""/40, 0x0, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x6, 0xffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) 11:10:22 executing program 1: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380)=0x2, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001400000129bd7000fedbdf25028020c8", @ANYRES32=0x0, @ANYBLOB="08000a00040000001400030070696d7265673100000000000000007008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x8804) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000140)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, 0xb0b0b0b0}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[{}], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000540)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000640)={&(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000700)={0x600, 0x2, &(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000040)=[0xfffffff7, 0x101], &(0x7f0000000680)=[0x0, r0, 0x0, r1, r2, 0x0, 0x0, 0x0, r3], &(0x7f00000006c0)=[0x81, 0xd0e, 0x9b, 0x4], 0x0, 0x100}) epoll_create(0x67) 11:10:22 executing program 5: socketpair(0x26, 0x1, 0x6, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xb7}, [@ringbuf_query, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x3, 0x0, 0x3, 0xa, 0xb, 0x80}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x6f, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x38ad, 0x1}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[{0x0, 0x2, 0x3, 0xa}, {0x8001, 0x1, 0x2, 0x3}], 0x10, 0x927}, 0x90) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x20, 0x0, @in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0xa0) 11:10:22 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x6, 0x4, 0xa, @local, @mcast2, 0x7, 0x7, 0x4, 0xffffffff}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:22 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e}, {}, {}, [@generic={0x81, 0x3, 0x0, 0x5, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0xfffffffe, 0x28, &(0x7f00000000c0)=""/40, 0x0, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x6, 0xffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x15000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 3: syz_io_uring_setup(0x6b07, &(0x7f0000000100)={0x0, 0xd451, 0x800, 0x3, 0x1a2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x1a13, &(0x7f0000000200)={0x0, 0x842b, 0x20, 0x0, 0x2e4}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1}) socket$inet6_udplite(0xa, 0x2, 0x88) (async) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000000), 0x4) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf250700000006001c00060000000600020000000000050013000400000006001d00020000000c001000ffff00000000000005000600030000000600010004000000050822000100000006001c0001040000"], 0x60}, 0x1, 0x0, 0x0, 0x98e6479302e7b978}, 0x20040080) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)="7e0d7f7f012faffe284367510d201fa2a14008c7b4ceb88a553bcec82caba2af295d2fff8b2e18f5", &(0x7f0000000080)=@tcp}, 0x20) 11:10:22 executing program 5: socketpair(0x26, 0x1, 0x6, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xb7}, [@ringbuf_query, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x3, 0x0, 0x3, 0xa, 0xb, 0x80}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x6f, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x38ad, 0x1}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[{0x0, 0x2, 0x3, 0xa}, {0x8001, 0x1, 0x2, 0x3}], 0x10, 0x927}, 0x90) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x20, 0x0, @in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0xa0) 11:10:22 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 11:10:22 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x6, 0x4, 0xa, @local, @mcast2, 0x7, 0x7, 0x4, 0xffffffff}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x6, 0x4, 0xa, @local, @mcast2, 0x7, 0x7, 0x4, 0xffffffff}}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 11:10:22 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x16000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:22 executing program 3: syz_io_uring_setup(0x6b07, &(0x7f0000000100)={0x0, 0xd451, 0x800, 0x3, 0x1a2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) (async) syz_io_uring_setup(0x1a13, &(0x7f0000000200)={0x0, 0x842b, 0x20, 0x0, 0x2e4}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1}) (async) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000000), 0x4) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf250700000006001c00060000000600020000000000050013000400000006001d00020000000c001000ffff00000000000005000600030000000600010004000000050822000100000006001c0001040000"], 0x60}, 0x1, 0x0, 0x0, 0x98e6479302e7b978}, 0x20040080) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)="7e0d7f7f012faffe284367510d201fa2a14008c7b4ceb88a553bcec82caba2af295d2fff8b2e18f5", &(0x7f0000000080)=@tcp}, 0x20) 11:10:23 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x6, 0x4, 0xa, @local, @mcast2, 0x7, 0x7, 0x4, 0xffffffff}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x6, 0x4, 0xa, @local, @mcast2, 0x7, 0x7, 0x4, 0xffffffff}}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 11:10:23 executing program 1: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380)=0x2, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001400000129bd7000fedbdf25028020c8", @ANYRES32=0x0, @ANYBLOB="08000a00040000001400030070696d7265673100000000000000007008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x8804) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000140)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, 0xb0b0b0b0}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[{}], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000540)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x4, 0x5}) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000640)={&(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000700)={0x600, 0x2, &(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000040)=[0xfffffff7, 0x101], &(0x7f0000000680)=[0x0, r0, 0x0, r1, r2, 0x0, 0x0, 0x0, r3], &(0x7f00000006c0)=[0x81, 0xd0e, 0x9b, 0x4], 0x0, 0x100}) (async) epoll_create(0x67) 11:10:23 executing program 5: socketpair(0x26, 0x1, 0x6, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xb7}, [@ringbuf_query, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x3, 0x0, 0x3, 0xa, 0xb, 0x80}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x6f, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x38ad, 0x1}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[{0x0, 0x2, 0x3, 0xa}, {0x8001, 0x1, 0x2, 0x3}], 0x10, 0x927}, 0x90) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x20, 0x0, @in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0xa0) socketpair(0x26, 0x1, 0x6, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xb7}, [@ringbuf_query, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @ldst={0x3, 0x0, 0x3, 0xa, 0xb, 0x80}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='GPL\x00', 0x6f, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x38ad, 0x1}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000240)=[{0x0, 0x2, 0x3, 0xa}, {0x8001, 0x1, 0x2, 0x3}], 0x10, 0x927}, 0x90) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x20, 0x0, @in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0xa0) (async) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x17000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 3: prctl$PR_SET_FPEMU(0xa, 0x1) prctl$PR_SET_FPEMU(0xa, 0x2) 11:10:23 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x5f) 11:10:23 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000), &(0x7f0000000040)}) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x18000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 11:10:23 executing program 3: prctl$PR_SET_FPEMU(0xa, 0x1) (async) prctl$PR_SET_FPEMU(0xa, 0x2) 11:10:23 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000), &(0x7f0000000040)}) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x19000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 1: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380)=0x2, 0x4) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001400000129bd7000fedbdf25028020c8", @ANYRES32=0x0, @ANYBLOB="08000a00040000001400030070696d7265673100000000000000007008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x8004}, 0x8804) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000140)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, 0xb0b0b0b0}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[{}], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000540)={&(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000640)={&(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000700)={0x600, 0x2, &(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000040)=[0xfffffff7, 0x101], &(0x7f0000000680)=[0x0, r0, 0x0, r1, r2, 0x0, 0x0, 0x0, r3], &(0x7f00000006c0)=[0x81, 0xd0e, 0x9b, 0x4], 0x0, 0x100}) (async) epoll_create(0x67) 11:10:23 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x5f) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffff87, 0x0}, 0x10) 11:10:23 executing program 3: prctl$PR_SET_FPEMU(0xa, 0x1) prctl$PR_SET_FPEMU(0xa, 0x2) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1a000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 5: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f00000000c0)={0x80000000, &(0x7f0000000000), &(0x7f0000000040)}) 11:10:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast]}, 0x48) 11:10:23 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x5f) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffff87, 0x0}, 0x10) 11:10:23 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x50, 0xffffffffffffffff, 0x10000000) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1b000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast]}, 0x48) 11:10:23 executing program 0: ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010100, @remote}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffff87, 0x0}, 0x10) 11:10:23 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x50, 0xffffffffffffffff, 0x10000000) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x50, 0xffffffffffffffff, 0x10000000) (async) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1c000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 1: epoll_create(0x67) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x18) 11:10:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast]}, 0x48) 11:10:23 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x50, 0xffffffffffffffff, 0x10000000) 11:10:23 executing program 0: ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010100, @remote}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:23 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x3, [0x9a, 0x81]}, {0x80000000, 0x0, 0x1, [0x5, 0xa9]}, 0x0, [0x7, 0x2]}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1d000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000400)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x9, 0x9, 0x7}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f00000004c0)={0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) recvfrom$l2tp6(r3, &(0x7f0000000880)=""/34, 0x22, 0x100, &(0x7f00000008c0)={0xa, 0x0, 0x0, @private0}, 0x20) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f00000006c0)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[{}, {}, {}], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x8, 0x4}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000740)=[0x0]}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000840)={0x2, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x6, 0x401], &(0x7f00000007c0)=[r1, r2, r4, 0x0, 0x0, 0x0, r5, 0x0, 0x0], &(0x7f0000000800)=[0x6, 0x8000000000000001, 0xf1b, 0x7fffffff]}) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1e000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x3, [0x9a, 0x81]}, {0x80000000, 0x0, 0x1, [0x5, 0xa9]}, 0x0, [0x7, 0x2]}) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:23 executing program 0: ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010100, @remote}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:23 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x94) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000400)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x9, 0x9, 0x7}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f00000004c0)={0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) recvfrom$l2tp6(r3, &(0x7f0000000880)=""/34, 0x22, 0x100, &(0x7f00000008c0)={0xa, 0x0, 0x0, @private0}, 0x20) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f00000006c0)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[{}, {}, {}], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x8, 0x4}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000740)=[0x0]}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000840)={0x2, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x6, 0x401], &(0x7f00000007c0)=[r1, r2, r4, 0x0, 0x0, 0x0, r5, 0x0, 0x0], &(0x7f0000000800)=[0x6, 0x8000000000000001, 0xf1b, 0x7fffffff]}) 11:10:23 executing program 1: epoll_create(0x67) socket$inet6_sctp(0xa, 0x5, 0x84) (async) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x18) 11:10:23 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1f000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:23 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x0) (async) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x7, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000400)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x9, 0x9, 0x7}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f00000004c0)={0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) recvfrom$l2tp6(r3, &(0x7f0000000880)=""/34, 0x22, 0x100, &(0x7f00000008c0)={0xa, 0x0, 0x0, @private0}, 0x20) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f00000006c0)={&(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[{}, {}, {}], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x8, 0x4}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000740)=[0x0]}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000840)={0x2, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x6, 0x401], &(0x7f00000007c0)=[r1, r2, r4, 0x0, 0x0, 0x0, r5, 0x0, 0x0], &(0x7f0000000800)=[0x6, 0x8000000000000001, 0xf1b, 0x7fffffff]}) 11:10:23 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x94) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) 11:10:23 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x3, [0x9a, 0x81]}, {0x80000000, 0x0, 0x1, [0x5, 0xa9]}, 0x0, [0x7, 0x2]}) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x3, [0x9a, 0x81]}, {0x80000000, 0x0, 0x1, [0x5, 0xa9]}, 0x0, [0x7, 0x2]}) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:23 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x80, 0x8001, 0x95c6], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x23c, 0x1f, 0x9, 0x3, 0x4, 0x334, 0x2, 0x6, 0xffffffffffffffb3], 0x0, 0x711a63d9}) 11:10:24 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x94) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) (async) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x94) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) (async) 11:10:24 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x80, 0x8001, 0x95c6], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x23c, 0x1f, 0x9, 0x3, 0x4, 0x334, 0x2, 0x6, 0xffffffffffffffb3], 0x0, 0x711a63d9}) (rerun: 32) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x20000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x700, 0x1, 0x20, 0x5, {{0xf, 0x4, 0x1, 0x0, 0x3c, 0x67, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@generic={0x88, 0xb, "893e4137b573109487"}, @noop, @lsrr={0x83, 0x17, 0xb8, [@rand_addr=0x64010100, @broadcast, @multicast1, @remote, @multicast2]}, @generic={0x86, 0x4, "a32a"}]}}}}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000080), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 11:10:24 executing program 3: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:24 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x80, 0x8001, 0x95c6], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x23c, 0x1f, 0x9, 0x3, 0x4, 0x334, 0x2, 0x6, 0xffffffffffffffb3], 0x0, 0x711a63d9}) 11:10:24 executing program 1: epoll_create(0x67) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x18) 11:10:24 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0xa0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000140), &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x0, 0xb0b0b0b0}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:24 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x700, 0x1, 0x20, 0x5, {{0xf, 0x4, 0x1, 0x0, 0x3c, 0x67, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@generic={0x88, 0xb, "893e4137b573109487"}, @noop, @lsrr={0x83, 0x17, 0xb8, [@rand_addr=0x64010100, @broadcast, @multicast1, @remote, @multicast2]}, @generic={0x86, 0x4, "a32a"}]}}}}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000080), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 11:10:24 executing program 3: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x21000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x54, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x8081) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan4\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, 0x0, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r5, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)={0x38, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x28840}, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x6d) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x3, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r9, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r10, 0x0, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8004091}, 0x8040) sendmsg$NL802154_CMD_GET_INTERFACE(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="08002bbd7000fbdbdf250500000008000300", @ANYRES32=r1, @ANYBLOB="08a89100", @ANYRES32=r8, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x22000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 3: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x10}, 0x18) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:24 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0xa0) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000140), &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x0, 0xb0b0b0b0}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:24 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x700, 0x1, 0x20, 0x5, {{0xf, 0x4, 0x1, 0x0, 0x3c, 0x67, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@generic={0x88, 0xb, "893e4137b573109487"}, @noop, @lsrr={0x83, 0x17, 0xb8, [@rand_addr=0x64010100, @broadcast, @multicast1, @remote, @multicast2]}, @generic={0x86, 0x4, "a32a"}]}}}}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000080), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x23000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 11:10:24 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, r1}, 0x18) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0, 0xffffffffffffffff}, 0x4) epoll_create(0x67) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x8, 0x7, 0x3}) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000280)={0xb, 0x9d8, 0x4, 0x4000, 0xffffffffffffffff}) ioctl$DMA_BUF_SET_NAME_A(r5, 0x40046201, &(0x7f00000002c0)=':\x00') ioctl$DRM_IOCTL_MODE_GETENCODER(r3, 0xc01464a6, &(0x7f0000000140)={r4}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_ext={0x1c, 0x26, &(0x7f00000016c0)=ANY=[@ANYBLOB="18111005080000000000000000000000000020004b11fd76fffa759c05b3b0ea50742636266c84f49979df8d0139f068d31fc1aad94c16d6b8ea5427548dfbe185cc75b4380a914a300fb9132dd6cdfccd36fc302d9e401e693c6336c3eb18d50e5ef5ebf5dc5dbde0efb5da2f480ca95df231c50e8574f67609c0d31263df1199d5fbc70a5f3589b6524c462ec010c927a0b49da5b2cb31282c25b378b4ffda3c469d6975ae8e2b1e1e822d3127426726642a628d5926f0cd0f2cfa1d462e8922df85d5b6f487eb6f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b70800004f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000004c0)='GPL\x00', 0x101, 0x1000, &(0x7f0000000500)=""/4096, 0x40e00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001540)={0x2, 0xa, 0x9, 0xc3be}, 0x10, 0x2ee19, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001580)=[{0x4, 0x4, 0xa, 0xb}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0xe, 0xb}, {0x1, 0x3, 0xb, 0x9}, {0x1, 0x3, 0x4, 0xa}, {0x1, 0x4, 0xa, 0x7}], 0x10, 0x1}, 0x90) write$yama_ptrace_scope(r6, 0x0, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000240)) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 11:10:24 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) (async) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0xa0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000140), &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x0, 0xb0b0b0b0}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:24 executing program 2: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x100000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x54, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x8081) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), r0) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan0\x00', 0x0}) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan4\x00', 0x0}) (async, rerun: 64) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, 0x0, 0x0) (async) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r5, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)={0x38, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x28840}, 0x20000000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x6d) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x3, 0x0, 0x0) (async, rerun: 64) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r9, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r10, 0x0, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8004091}, 0x8040) sendmsg$NL802154_CMD_GET_INTERFACE(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="08002bbd7000fbdbdf250500000008000300", @ANYRES32=r1, @ANYBLOB="08a89100", @ANYRES32=r8, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 11:10:24 executing program 2: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x200000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x54, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x8081) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan4\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_VENDOR(r5, 0x0, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r5, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)={0x38, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x28840}, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x6d) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x3, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r9, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r10, 0x0, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8004091}, 0x8040) sendmsg$NL802154_CMD_GET_INTERFACE(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="08002bbd7000fbdbdf250500000008000300", @ANYRES32=r1, @ANYBLOB="08a89100", @ANYRES32=r8, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x54, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x8081) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), r0) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan4\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_VENDOR(r5, 0x0, 0x0) (async) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r5, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)={0x38, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x28840}, 0x20000000) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x6d) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x3, 0x0, 0x0) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000200)={'wpan4\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), r0) (async) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r9, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r10, 0x0, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8004091}, 0x8040) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="08002bbd7000fbdbdf250500000008000300", @ANYRES32=r1, @ANYBLOB="08a89100", @ANYRES32=r8, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) (async) 11:10:24 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x66, 0x3ff, 0xff, 0x10, r0, 0x3f, '\x00', 0x0, r1, 0x4, 0x2}, 0x48) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x300000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 2: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x66, 0x3ff, 0xff, 0x10, r0, 0x3f, '\x00', 0x0, r1, 0x4, 0x2}, 0x48) 11:10:24 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="126ddf8c", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf250500000006001c000100000008000c0003000000050012000500000006001d000100000008001900ac1414bb05001200ff00000008000b0002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4048090}, 0x4000841) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) 11:10:24 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, r1}, 0x18) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0, 0xffffffffffffffff}, 0x4) (async) epoll_create(0x67) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x8, 0x7, 0x3}) (async) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000280)={0xb, 0x9d8, 0x4, 0x4000, 0xffffffffffffffff}) ioctl$DMA_BUF_SET_NAME_A(r5, 0x40046201, &(0x7f00000002c0)=':\x00') (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r3, 0xc01464a6, &(0x7f0000000140)={r4}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_ext={0x1c, 0x26, &(0x7f00000016c0)=ANY=[@ANYBLOB="18111005080000000000000000000000000020004b11fd76fffa759c05b3b0ea50742636266c84f49979df8d0139f068d31fc1aad94c16d6b8ea5427548dfbe185cc75b4380a914a300fb9132dd6cdfccd36fc302d9e401e693c6336c3eb18d50e5ef5ebf5dc5dbde0efb5da2f480ca95df231c50e8574f67609c0d31263df1199d5fbc70a5f3589b6524c462ec010c927a0b49da5b2cb31282c25b378b4ffda3c469d6975ae8e2b1e1e822d3127426726642a628d5926f0cd0f2cfa1d462e8922df85d5b6f487eb6f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b70800004f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000004c0)='GPL\x00', 0x101, 0x1000, &(0x7f0000000500)=""/4096, 0x40e00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001540)={0x2, 0xa, 0x9, 0xc3be}, 0x10, 0x2ee19, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001580)=[{0x4, 0x4, 0xa, 0xb}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0xe, 0xb}, {0x1, 0x3, 0xb, 0x9}, {0x1, 0x3, 0x4, 0xa}, {0x1, 0x4, 0xa, 0x7}], 0x10, 0x1}, 0x90) (async) write$yama_ptrace_scope(r6, 0x0, 0x0) (async) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000240)) 11:10:24 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x9, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x918, 0x2, 0x3}, 0x48) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="c82971b2", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x94, &(0x7f0000000140)=""/148, 0x41100, 0x24, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, r3, r4], &(0x7f0000000380), 0x10, 0x1}, 0x90) 11:10:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="126ddf8c", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf250500000006001c000100000008000c0003000000050012000500000006001d000100000008001900ac1414bb05001200ff00000008000b0002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4048090}, 0x4000841) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) 11:10:24 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x66, 0x3ff, 0xff, 0x10, r0, 0x3f, '\x00', 0x0, r1, 0x4, 0x2}, 0x48) 11:10:24 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x400000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:24 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:25 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) r0 = socket(0x1a, 0x1, 0x7) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) 11:10:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="126ddf8c", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf250500000006001c000100000008000c0003000000050012000500000006001d000100000008001900ac1414bb05001200ff00000008000b0002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4048090}, 0x4000841) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="126ddf8c", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf250500000006001c000100000008000c0003000000050012000500000006001d000100000008001900ac1414bb05001200ff00000008000b0002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4048090}, 0x4000841) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) (async) 11:10:25 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x9, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x918, 0x2, 0x3}, 0x48) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="c82971b2", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x94, &(0x7f0000000140)=""/148, 0x41100, 0x24, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, r3, r4], &(0x7f0000000380), 0x10, 0x1}, 0x90) 11:10:25 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_SHUTDOWN={0x22, 0x0, 0x0, r2}) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x500000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x9, 0x2, 0x4}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x918, 0x2, 0x3}, 0x48) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="c82971b2", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x94, &(0x7f0000000140)=""/148, 0x41100, 0x24, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, r3, r4], &(0x7f0000000380), 0x10, 0x1}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="c82971b2", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x94, &(0x7f0000000140)=""/148, 0x41100, 0x24, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, r3, r4], &(0x7f0000000380), 0x10, 0x1}, 0x90) 11:10:25 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, r1}, 0x18) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0, 0xffffffffffffffff}, 0x4) (async) epoll_create(0x67) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x8, 0x7, 0x3}) (async) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000280)={0xb, 0x9d8, 0x4, 0x4000, 0xffffffffffffffff}) ioctl$DMA_BUF_SET_NAME_A(r5, 0x40046201, &(0x7f00000002c0)=':\x00') (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r3, 0xc01464a6, &(0x7f0000000140)={r4}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_ext={0x1c, 0x26, &(0x7f00000016c0)=ANY=[@ANYBLOB="18111005080000000000000000000000000020004b11fd76fffa759c05b3b0ea50742636266c84f49979df8d0139f068d31fc1aad94c16d6b8ea5427548dfbe185cc75b4380a914a300fb9132dd6cdfccd36fc302d9e401e693c6336c3eb18d50e5ef5ebf5dc5dbde0efb5da2f480ca95df231c50e8574f67609c0d31263df1199d5fbc70a5f3589b6524c462ec010c927a0b49da5b2cb31282c25b378b4ffda3c469d6975ae8e2b1e1e822d3127426726642a628d5926f0cd0f2cfa1d462e8922df85d5b6f487eb6f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000b7080000000000007b8af8ff00000000b70800004f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000004c0)='GPL\x00', 0x101, 0x1000, &(0x7f0000000500)=""/4096, 0x40e00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001540)={0x2, 0xa, 0x9, 0xc3be}, 0x10, 0x2ee19, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001580)=[{0x4, 0x4, 0xa, 0xb}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x4, 0xe, 0xb}, {0x1, 0x3, 0xb, 0x9}, {0x1, 0x3, 0x4, 0xa}, {0x1, 0x4, 0xa, 0x7}], 0x10, 0x1}, 0x90) (async) write$yama_ptrace_scope(r6, 0x0, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000240)) 11:10:25 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0x81, 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:25 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) r0 = socket(0x1a, 0x1, 0x7) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) (async) socket(0x1a, 0x1, 0x7) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) (async) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x600000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_SHUTDOWN={0x22, 0x0, 0x0, r2}) 11:10:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0xc00) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x1f, 0x0}, 0x10) 11:10:25 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0x81, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:25 executing program 0: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0x81, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:25 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) (async) r0 = socket(0x1a, 0x1, 0x7) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x700000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_SHUTDOWN={0x22, 0x0, 0x0, r2}) 11:10:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async, rerun: 64) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0xc00) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x1f, 0x0}, 0x10) 11:10:25 executing program 1: epoll_create(0x67) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x800000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x480080, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) r2 = socket(0x1f, 0x4, 0x6) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd3d) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getaddr={0x64, 0x16, 0x100, 0x70bd28, 0x25dfdbff, {0xa, 0x10, 0xc4, 0xfe}, [@IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFA_LOCAL={0x14, 0x2, @remote}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0xc5}, 0x1) 11:10:25 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x15}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x900000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd3d) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getaddr={0x64, 0x16, 0x100, 0x70bd28, 0x25dfdbff, {0xa, 0x10, 0xc4, 0xfe}, [@IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFA_LOCAL={0x14, 0x2, @remote}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0xc5}, 0x1) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xa00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0xc00) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x1f, 0x0}, 0x10) 11:10:25 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x15}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x15}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 11:10:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd3d) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getaddr={0x64, 0x16, 0x100, 0x70bd28, 0x25dfdbff, {0xa, 0x10, 0xc4, 0xfe}, [@IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IFA_LOCAL={0x14, 0x2, @remote}, @IFA_TARGET_NETNSID={0x8, 0xa, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0xc5}, 0x1) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xb00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 1: epoll_create(0x67) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) (async) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:10:25 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_WRITE={0x17, 0x21, 0x3, @fd_index=0xa, 0xfffffffffffffff9, &(0x7f0000000380)="94de5c338eccec7b1e0d6f79104325e153291cb63887b0d405b69dbe73fdc35d02b940ba5a6bb54533bb9ee127216bef57ef084a0f4d28c3420ee2f8c962f6e7566f94489d9b8938f9cd1fb08d5737b7f9e85c3b431322d075a8bba56808b2eb18ec12f6406e38881e2cd1a4a9a6fc960e5d272786bc20", 0x77, 0x0, 0x1}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x13, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @alu={0x7, 0x1, 0x2, 0x6, 0xc, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xb, 0x9, 0xffffffff}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000240)=[{0x5, 0x2, 0x1, 0x5}, {0x0, 0x1, 0x3, 0x4}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x10, 0x7}, {0x5, 0x3, 0x5, 0x4}], 0x10, 0x10000}, 0x90) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) 11:10:25 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x480080, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) r2 = socket(0x1f, 0x4, 0x6) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x480080, 0x0) (async) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) (async) socket(0x1f, 0x4, 0x6) (async) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) ioctl$RTC_AIE_OFF(r0, 0x7002) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xca}], &(0x7f0000000040)='GPL\x00', 0xfffffffd, 0x86, &(0x7f0000000080)=""/134, 0x40e00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, r0, r1], &(0x7f0000000240), 0x10, 0x1}, 0x90) 11:10:25 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x15}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xc00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_WRITE={0x17, 0x21, 0x3, @fd_index=0xa, 0xfffffffffffffff9, &(0x7f0000000380)="94de5c338eccec7b1e0d6f79104325e153291cb63887b0d405b69dbe73fdc35d02b940ba5a6bb54533bb9ee127216bef57ef084a0f4d28c3420ee2f8c962f6e7566f94489d9b8938f9cd1fb08d5737b7f9e85c3b431322d075a8bba56808b2eb18ec12f6406e38881e2cd1a4a9a6fc960e5d272786bc20", 0x77, 0x0, 0x1}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) (async) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x13, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @alu={0x7, 0x1, 0x2, 0x6, 0xc, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xb, 0x9, 0xffffffff}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000240)=[{0x5, 0x2, 0x1, 0x5}, {0x0, 0x1, 0x3, 0x4}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x10, 0x7}, {0x5, 0x3, 0x5, 0x4}], 0x10, 0x10000}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x13, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @alu={0x7, 0x1, 0x2, 0x6, 0xc, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xb, 0x9, 0xffffffff}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000240)=[{0x5, 0x2, 0x1, 0x5}, {0x0, 0x1, 0x3, 0x4}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x10, 0x7}, {0x5, 0x3, 0x5, 0x4}], 0x10, 0x10000}, 0x90) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) 11:10:25 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)={@empty, @multicast2}) getegid() r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:10:25 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xd00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:25 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xca}], &(0x7f0000000040)='GPL\x00', 0xfffffffd, 0x86, &(0x7f0000000080)=""/134, 0x40e00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, r0, r1], &(0x7f0000000240), 0x10, 0x1}, 0x90) 11:10:26 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x480080, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) r2 = socket(0x1f, 0x4, 0x6) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x480080, 0x0) (async) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) (async) socket(0x1f, 0x4, 0x6) (async) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) ioctl$RTC_AIE_OFF(r0, 0x7002) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:26 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_WRITE={0x17, 0x21, 0x3, @fd_index=0xa, 0xfffffffffffffff9, &(0x7f0000000380)="94de5c338eccec7b1e0d6f79104325e153291cb63887b0d405b69dbe73fdc35d02b940ba5a6bb54533bb9ee127216bef57ef084a0f4d28c3420ee2f8c962f6e7566f94489d9b8938f9cd1fb08d5737b7f9e85c3b431322d075a8bba56808b2eb18ec12f6406e38881e2cd1a4a9a6fc960e5d272786bc20", 0x77, 0x0, 0x1}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x13, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @alu={0x7, 0x1, 0x2, 0x6, 0xc, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xb, 0x9, 0xffffffff}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000240)=[{0x5, 0x2, 0x1, 0x5}, {0x0, 0x1, 0x3, 0x4}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x10, 0x7}, {0x5, 0x3, 0x5, 0x4}], 0x10, 0x10000}, 0x90) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_WRITE={0x17, 0x21, 0x3, @fd_index=0xa, 0xfffffffffffffff9, &(0x7f0000000380)="94de5c338eccec7b1e0d6f79104325e153291cb63887b0d405b69dbe73fdc35d02b940ba5a6bb54533bb9ee127216bef57ef084a0f4d28c3420ee2f8c962f6e7566f94489d9b8938f9cd1fb08d5737b7f9e85c3b431322d075a8bba56808b2eb18ec12f6406e38881e2cd1a4a9a6fc960e5d272786bc20", 0x77, 0x0, 0x1}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x101, 0x0, 0xffffffffffffffff, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x13, &(0x7f00000000c0)=@raw=[@exit, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query, @alu={0x7, 0x1, 0x2, 0x6, 0xc, 0xfffffffffffffffc, 0xfffffffffffffff0}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xb, 0x9, 0xffffffff}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000240)=[{0x5, 0x2, 0x1, 0x5}, {0x0, 0x1, 0x3, 0x4}, {0x3, 0x3, 0x2, 0x5}, {0x1, 0x5, 0x2, 0xb}, {0x4, 0x3, 0x10, 0x7}, {0x5, 0x3, 0x5, 0x4}], 0x10, 0x10000}, 0x90) (async) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) (async) 11:10:26 executing program 1: epoll_create(0x67) (async) epoll_create(0x67) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x1, 0x0, 0xeeeeeeee}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xe00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)={@empty, @multicast2}) (async) getegid() (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:10:26 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x44b4}, 0x8) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000140)) 11:10:26 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xca}], &(0x7f0000000040)='GPL\x00', 0xfffffffd, 0x86, &(0x7f0000000080)=""/134, 0x40e00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xe, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x1, 0x1, r0, r1], &(0x7f0000000240), 0x10, 0x1}, 0x90) 11:10:26 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7fff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c800}, 0x1804c010) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:26 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7fff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c800}, 0x1804c010) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:26 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000000)="969a8f8baf77ffb13dd5073d64455cb0f5a2d7fdbdeb9e82678a69dbfc2241675f2a0c31e8bd7af386966da858dc8ecb77942f7703da5d0e79f0acd09491b08386c6e07a0aec347bd5e054864ff1fd8ebaa8837734ff9eda8c0fae6dc3f9e421af385192c4bc08deca17ca817a092a101514b05962179a3a91bf9965bd37db7a4d6ec44c15052bbccfed4a34c1d632bfba35dd972c8ae9c4417d4a9bec6c60b9352821c6193ee72575f50b1e2c8bb8dcebd8a96067df20001e2beffaaad1607c1c42cc6e4a", 0xc5, 0x4000800, &(0x7f0000000100)={0xa, 0x0, 0x10000, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x3ff, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) ioctl$SIOCGETSGCNT(r3, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000340)) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000001ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a80)={&(0x7f00000003c0)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0xf}}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x895}, 0x10) recvfrom$l2tp6(r3, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) r6 = syz_open_dev$dri(&(0x7f0000001880), 0x2, 0x64100) ioctl$DRM_IOCTL_MODE_GETENCODER(r6, 0xc01464a6, &(0x7f00000018c0)) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000001900)=ANY=[@ANYBLOB="0200000000400000010000c008000000ad8d0000b2ac000002007349289758a677f27936cee6380000000000000000008001000080800000000002000009acdd0000000000"]) r7 = socket(0x25, 0x80000, 0x5) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r5) sendmsg$L2TP_CMD_TUNNEL_DELETE(r7, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="20002bbd7000fbdbdf250200000008001700", @ANYRES32=r3, @ANYBLOB="4a46b7da"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000001840)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001800)={&(0x7f00000017c0)={0x2c, r8, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x801) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r10, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="31c8a9c5c05fd4a5df25030000000500130002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x4040) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001c00)={'ip_vti0\x00', &(0x7f0000001b00)={'syztnl1\x00', 0x0, 0x700, 0x10, 0x6, 0x0, {{0x34, 0x4, 0x2, 0x13, 0xd0, 0x67, 0x0, 0xe2, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x33}, @empty, {[@cipso={0x86, 0x10, 0x3, [{0x1, 0x4, "e0e7"}, {0x0, 0x6, "bee704f2"}]}, @rr={0x7, 0x1b, 0x5a, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x86, 0x9, "eee7a174932cfe"}, @lsrr={0x83, 0x17, 0xc5, [@dev={0xac, 0x14, 0x14, 0x36}, @loopback, @loopback, @loopback, @rand_addr=0x64010100]}, @ssrr={0x89, 0xb, 0xbc, [@rand_addr=0x64010102, @loopback]}, @rr={0x7, 0xb, 0x5d, [@rand_addr=0x64010101, @remote]}, @timestamp_addr={0x44, 0xc, 0xc3, 0x1, 0xa, [{@remote, 0x823}]}, @timestamp_addr={0x44, 0x4c, 0x75, 0x1, 0x6, [{@empty, 0x2}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0x34}, 0x8}, {@remote, 0x4}, {@local, 0x1}, {@private=0xa010102, 0xfff}, {@loopback, 0xfff}, {@empty, 0x9}]}]}}}}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x36, &(0x7f0000001980)=ANY=[@ANYBLOB="1800000008000000000000000010000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES64=r11, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000120700001900000018210000", @ANYRES32=r1, @ANYBLOB="00000000050000009500000000000000bd135000efffffff8520000002000000bf91000000000000b7020000ce485dc18500000084000000b7000000000000009500000000000000"], &(0x7f0000000440)='GPL\x00', 0x8fd4, 0x1000, &(0x7f0000000480)=""/4096, 0x40f00, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001480)={0x0, 0xc, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000014c0)=[r9], &(0x7f0000001500)=[{0x0, 0x5, 0xb, 0x1}, {0x5, 0x4, 0xa, 0xa}, {0x1, 0x4, 0x94b7, 0x8}, {0x3, 0x3, 0x4, 0xb}, {0x5, 0x1, 0x0, 0xc}, {0x0, 0x5, 0xc, 0xc}, {0x4, 0x4, 0xd, 0x1}, {0x5, 0x3, 0x8, 0x6}, {0x0, 0x3, 0x2, 0x3}], 0x10, 0x3}, 0x90) 11:10:26 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)={@empty, @multicast2}) getegid() (async) getegid() r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0xf00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 64) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x44b4}, 0x8) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000140)) 11:10:26 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7fff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c800}, 0x1804c010) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:26 executing program 1: ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x45, 0x1}) syz_io_uring_submit(0x0, 0x0, 0x0) syz_io_uring_setup(0x6a21, &(0x7f00000001c0)={0x0, 0x0, 0x2000, 0x0, 0x24f}, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x8) epoll_create(0xfffff99b) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000080)={{0x80000000, 0x0, 0x1, [0xe51, 0x2]}, {0x80000000, 0x0, 0x0, [0x2, 0x53]}, 0x0, [0x2, 0x81]}) 11:10:26 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x49, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:26 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x44b4}, 0x8) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000140)) 11:10:26 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @null, @netrom, @default, @rose, @rose, @rose, @rose]}, &(0x7f0000000080)=0x48) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1000000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000000)="969a8f8baf77ffb13dd5073d64455cb0f5a2d7fdbdeb9e82678a69dbfc2241675f2a0c31e8bd7af386966da858dc8ecb77942f7703da5d0e79f0acd09491b08386c6e07a0aec347bd5e054864ff1fd8ebaa8837734ff9eda8c0fae6dc3f9e421af385192c4bc08deca17ca817a092a101514b05962179a3a91bf9965bd37db7a4d6ec44c15052bbccfed4a34c1d632bfba35dd972c8ae9c4417d4a9bec6c60b9352821c6193ee72575f50b1e2c8bb8dcebd8a96067df20001e2beffaaad1607c1c42cc6e4a", 0xc5, 0x4000800, &(0x7f0000000100)={0xa, 0x0, 0x10000, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x3ff, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) (async) ioctl$SIOCGETSGCNT(r3, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000340)) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000001ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a80)={&(0x7f00000003c0)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0xf}}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x895}, 0x10) (async) recvfrom$l2tp6(r3, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) (async) r6 = syz_open_dev$dri(&(0x7f0000001880), 0x2, 0x64100) ioctl$DRM_IOCTL_MODE_GETENCODER(r6, 0xc01464a6, &(0x7f00000018c0)) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000001900)=ANY=[@ANYBLOB="0200000000400000010000c008000000ad8d0000b2ac000002007349289758a677f27936cee6380000000000000000008001000080800000000002000009acdd0000000000"]) r7 = socket(0x25, 0x80000, 0x5) (async) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r5) sendmsg$L2TP_CMD_TUNNEL_DELETE(r7, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="20002bbd7000fbdbdf250200000008001700", @ANYRES32=r3, @ANYBLOB="4a46b7da"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000001840)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001800)={&(0x7f00000017c0)={0x2c, r8, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x801) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) (async) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r10, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="31c8a9c5c05fd4a5df25030000000500130002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x4040) (async) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001c00)={'ip_vti0\x00', &(0x7f0000001b00)={'syztnl1\x00', 0x0, 0x700, 0x10, 0x6, 0x0, {{0x34, 0x4, 0x2, 0x13, 0xd0, 0x67, 0x0, 0xe2, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x33}, @empty, {[@cipso={0x86, 0x10, 0x3, [{0x1, 0x4, "e0e7"}, {0x0, 0x6, "bee704f2"}]}, @rr={0x7, 0x1b, 0x5a, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x86, 0x9, "eee7a174932cfe"}, @lsrr={0x83, 0x17, 0xc5, [@dev={0xac, 0x14, 0x14, 0x36}, @loopback, @loopback, @loopback, @rand_addr=0x64010100]}, @ssrr={0x89, 0xb, 0xbc, [@rand_addr=0x64010102, @loopback]}, @rr={0x7, 0xb, 0x5d, [@rand_addr=0x64010101, @remote]}, @timestamp_addr={0x44, 0xc, 0xc3, 0x1, 0xa, [{@remote, 0x823}]}, @timestamp_addr={0x44, 0x4c, 0x75, 0x1, 0x6, [{@empty, 0x2}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0x34}, 0x8}, {@remote, 0x4}, {@local, 0x1}, {@private=0xa010102, 0xfff}, {@loopback, 0xfff}, {@empty, 0x9}]}]}}}}}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x36, &(0x7f0000001980)=ANY=[@ANYBLOB="1800000008000000000000000010000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES64=r11, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000120700001900000018210000", @ANYRES32=r1, @ANYBLOB="00000000050000009500000000000000bd135000efffffff8520000002000000bf91000000000000b7020000ce485dc18500000084000000b7000000000000009500000000000000"], &(0x7f0000000440)='GPL\x00', 0x8fd4, 0x1000, &(0x7f0000000480)=""/4096, 0x40f00, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001480)={0x0, 0xc, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000014c0)=[r9], &(0x7f0000001500)=[{0x0, 0x5, 0xb, 0x1}, {0x5, 0x4, 0xa, 0xa}, {0x1, 0x4, 0x94b7, 0x8}, {0x3, 0x3, 0x4, 0xb}, {0x5, 0x1, 0x0, 0xc}, {0x0, 0x5, 0xc, 0xc}, {0x4, 0x4, 0xd, 0x1}, {0x5, 0x3, 0x8, 0x6}, {0x0, 0x3, 0x2, 0x3}], 0x10, 0x3}, 0x90) 11:10:26 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x49, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x10000000) (async) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x49, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:26 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @null, @netrom, @default, @rose, @rose, @rose, @rose]}, &(0x7f0000000080)=0x48) 11:10:26 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000000)="969a8f8baf77ffb13dd5073d64455cb0f5a2d7fdbdeb9e82678a69dbfc2241675f2a0c31e8bd7af386966da858dc8ecb77942f7703da5d0e79f0acd09491b08386c6e07a0aec347bd5e054864ff1fd8ebaa8837734ff9eda8c0fae6dc3f9e421af385192c4bc08deca17ca817a092a101514b05962179a3a91bf9965bd37db7a4d6ec44c15052bbccfed4a34c1d632bfba35dd972c8ae9c4417d4a9bec6c60b9352821c6193ee72575f50b1e2c8bb8dcebd8a96067df20001e2beffaaad1607c1c42cc6e4a", 0xc5, 0x4000800, &(0x7f0000000100)={0xa, 0x0, 0x10000, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x3ff, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044880}, 0x810) (async) ioctl$SIOCGETSGCNT(r3, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000340)) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000001ac0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001a80)={&(0x7f00000003c0)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0xf}}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010100}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x895}, 0x10) (async) recvfrom$l2tp6(r3, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) r6 = syz_open_dev$dri(&(0x7f0000001880), 0x2, 0x64100) ioctl$DRM_IOCTL_MODE_GETENCODER(r6, 0xc01464a6, &(0x7f00000018c0)) (async) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000001900)=ANY=[@ANYBLOB="0200000000400000010000c008000000ad8d0000b2ac000002007349289758a677f27936cee6380000000000000000008001000080800000000002000009acdd0000000000"]) (async) r7 = socket(0x25, 0x80000, 0x5) (async) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r5) sendmsg$L2TP_CMD_TUNNEL_DELETE(r7, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="20002bbd7000fbdbdf250200000008001700", @ANYRES32=r3, @ANYBLOB="4a46b7da"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000001840)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001800)={&(0x7f00000017c0)={0x2c, r8, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x801) (async) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r10, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="31c8a9c5c05fd4a5df25030000000500130002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x4040) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001c00)={'ip_vti0\x00', &(0x7f0000001b00)={'syztnl1\x00', 0x0, 0x700, 0x10, 0x6, 0x0, {{0x34, 0x4, 0x2, 0x13, 0xd0, 0x67, 0x0, 0xe2, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x33}, @empty, {[@cipso={0x86, 0x10, 0x3, [{0x1, 0x4, "e0e7"}, {0x0, 0x6, "bee704f2"}]}, @rr={0x7, 0x1b, 0x5a, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @generic={0x86, 0x9, "eee7a174932cfe"}, @lsrr={0x83, 0x17, 0xc5, [@dev={0xac, 0x14, 0x14, 0x36}, @loopback, @loopback, @loopback, @rand_addr=0x64010100]}, @ssrr={0x89, 0xb, 0xbc, [@rand_addr=0x64010102, @loopback]}, @rr={0x7, 0xb, 0x5d, [@rand_addr=0x64010101, @remote]}, @timestamp_addr={0x44, 0xc, 0xc3, 0x1, 0xa, [{@remote, 0x823}]}, @timestamp_addr={0x44, 0x4c, 0x75, 0x1, 0x6, [{@empty, 0x2}, {@loopback, 0x7}, {@rand_addr=0x64010101, 0x5}, {@dev={0xac, 0x14, 0x14, 0x34}, 0x8}, {@remote, 0x4}, {@local, 0x1}, {@private=0xa010102, 0xfff}, {@loopback, 0xfff}, {@empty, 0x9}]}]}}}}}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000015c0)={0x6, 0x36, &(0x7f0000001980)=ANY=[@ANYBLOB="1800000008000000000000000010000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES64=r11, @ANYRES32=r8, @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000120700001900000018210000", @ANYRES32=r1, @ANYBLOB="00000000050000009500000000000000bd135000efffffff8520000002000000bf91000000000000b7020000ce485dc18500000084000000b7000000000000009500000000000000"], &(0x7f0000000440)='GPL\x00', 0x8fd4, 0x1000, &(0x7f0000000480)=""/4096, 0x40f00, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001480)={0x0, 0xc, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000014c0)=[r9], &(0x7f0000001500)=[{0x0, 0x5, 0xb, 0x1}, {0x5, 0x4, 0xa, 0xa}, {0x1, 0x4, 0x94b7, 0x8}, {0x3, 0x3, 0x4, 0xb}, {0x5, 0x1, 0x0, 0xc}, {0x0, 0x5, 0xc, 0xc}, {0x4, 0x4, 0xd, 0x1}, {0x5, 0x3, 0x8, 0x6}, {0x0, 0x3, 0x2, 0x3}], 0x10, 0x3}, 0x90) 11:10:26 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1100000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x49, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:26 executing program 1: ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x45, 0x1}) syz_io_uring_submit(0x0, 0x0, 0x0) syz_io_uring_setup(0x6a21, &(0x7f00000001c0)={0x0, 0x0, 0x2000, 0x0, 0x24f}, 0x0, 0x0) (async) syz_io_uring_setup(0x6a21, &(0x7f00000001c0)={0x0, 0x0, 0x2000, 0x0, 0x24f}, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x8) epoll_create(0xfffff99b) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000080)={{0x80000000, 0x0, 0x1, [0xe51, 0x2]}, {0x80000000, 0x0, 0x0, [0x2, 0x53]}, 0x0, [0x2, 0x81]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000080)={{0x80000000, 0x0, 0x1, [0xe51, 0x2]}, {0x80000000, 0x0, 0x0, [0x2, 0x53]}, 0x0, [0x2, 0x81]}) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1200000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"eeab2485748f76e4ca65dbaa21777f18eb88a40373f0e7579d23f258822828dce05b422179080244532ae81565c364c0fa678ee02fc642c57c1f12799378a66193676360ea8b65e3104256a9fff2c7a49b17812b41d0b4cf69b4b56fdbb61a8851d565be2b95ef15dac7a88b1c7728ce91ed76fe76767be87f0c38f25ccbf565937628aa2a87716929fc354dc7af921a6f2443fd10d55fabb704a9864fefab585629372095e8b2f263ecf1cb1b71c95463b120e4f99a061a78ef74c4e4e36d0d2fb027025490c79032ccf0f4af5f059f761a318fe222755be01d47dced12d0f56c47c1f595fc5f40d27f87fe7cda00924f79566c04c14cebd2e0c4d36dc0ee1c541691a486c6b7120539c36183312610926d5efe84116f5d6f28cc91d981bb3effef7a379f1d238a4d16508741a588435340cb2a84c46854de33633f90971077e8206b81f5e093c6b9d9f6016134ec398e92460fcf3323c28f92ab22649c0b1f867ee21677e6cf5dcf3831acd30fea6b6ea7e3dfb6c93ac8a11835b34340c66ac01904d01d14d93856399695ad0953f75252ff55a913662c6b14037f4ec13b659327187be0febef90d3dfebac212f0b36ec2abcd65b629053bf5a55e776bcc234292bfe4cdbf45c0874d8887f07c3a2e39af0f5bf95e9e4156f630554d7d6882ad9a4306757b3206c777ea82f75f6879414ae7f048f1c4e39ee4ac1ac30bb893761d9135581a822135e6cee5f106e7cd00334a3afb9df591897be579708be3e3661d2ec822eaa6566ed204ccc19ce3972b93a79831f545be8edb5367381d984415e455da3124da22ee53f23e816cfd25c2e6abd0a130fbc55b8cfd7d33f1dddbe417bb9f4518ed286a3ccd9ae3b4f6a72b8155075e3d6d81c291b4d5fceccbc7b1c95de7b90d8ef3892e9b77a800c0d24ff9339760da555769b3290e536be75fb5b2e9e00ef6766ec2be02721565d77d15535a4b94cd27adc3acd971dd9a4188d381d76254cc03cde381c1d59f395e10b891355a48a8c4ccc03fe552e6e2cda5625a3ae26bc8c73d8b43f805df97d8a7f09854dcd527e90b70fe3a72a3b7bfa3786b7dd8fbe428d08fb0c88b8d601c4597028bcf5f34fa11a9aab2c85e14177d27369ecac32d275e7a7095d8752a5afd97ac11eb97458773b5aef2de92924fdeed893c949136173e15dad04239afe8be6b51599c7d10ac00000000000000003c538b3197584201fe1eee80ae5a026f4843b29ccc0ea38816f4fc164e4622b4e6226321732ae88b83d249d25a5d3f3f0b92dc4d22500eecc257c8bf328720e8e03dd0ee132b26932e4e6a145efb8dfa79a6c5821d04d186091ae5229e7d35ec55602bca401bf19d60df6f80e95b4909e96cb237a09d1d6d1c0297c5029b0af9771489ae493380fefe6256edeea6de341fa4b7034e499734db410a91b941452b00"}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000000000000100000003000000010000006ea000000300000000000000000000810400000007000038e100000055ee7828953f165a0b0000001f000000b8b6000002000000010100000000000008000080ff0700000600000066d4000000000000000000000a000000c60000000200000008d9da45a9d9a6f319000000040000005dff00008b010000080000000204000000000000020000000000000008000000a40000000900000000000000000000800600000003000000020000000101000000000000000000801c000000090000000080000009000000000000000400000001000080200000009200143f2500000000000000669bc630420f6187d59da9199fc88c957af7b407a97efc99aa490906af4c0543b6cd13814463abb2bb2b3c1712be07db7109a919b0ef3e8361777bfdbab1bb24584afcb44846ed7a70d436ec3c003a88f76ccbfad9c7090da0504580bc3bd1ca4f254dd0268d41a87cbb9fdb61c076bb098b83a974b0671493b9b581e9355abea6ca6110eea00eac79f808ab1eb55f2c2d736bbe08efed5c36c628085a007bf8295c11090c45a9c4eea2bb1432a29800eceafe9aed"]) 11:10:26 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @null, @netrom, @default, @rose, @rose, @rose, @rose]}, &(0x7f0000000080)=0x48) 11:10:26 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x38f01, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 11:10:26 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:26 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"eeab2485748f76e4ca65dbaa21777f18eb88a40373f0e7579d23f258822828dce05b422179080244532ae81565c364c0fa678ee02fc642c57c1f12799378a66193676360ea8b65e3104256a9fff2c7a49b17812b41d0b4cf69b4b56fdbb61a8851d565be2b95ef15dac7a88b1c7728ce91ed76fe76767be87f0c38f25ccbf565937628aa2a87716929fc354dc7af921a6f2443fd10d55fabb704a9864fefab585629372095e8b2f263ecf1cb1b71c95463b120e4f99a061a78ef74c4e4e36d0d2fb027025490c79032ccf0f4af5f059f761a318fe222755be01d47dced12d0f56c47c1f595fc5f40d27f87fe7cda00924f79566c04c14cebd2e0c4d36dc0ee1c541691a486c6b7120539c36183312610926d5efe84116f5d6f28cc91d981bb3effef7a379f1d238a4d16508741a588435340cb2a84c46854de33633f90971077e8206b81f5e093c6b9d9f6016134ec398e92460fcf3323c28f92ab22649c0b1f867ee21677e6cf5dcf3831acd30fea6b6ea7e3dfb6c93ac8a11835b34340c66ac01904d01d14d93856399695ad0953f75252ff55a913662c6b14037f4ec13b659327187be0febef90d3dfebac212f0b36ec2abcd65b629053bf5a55e776bcc234292bfe4cdbf45c0874d8887f07c3a2e39af0f5bf95e9e4156f630554d7d6882ad9a4306757b3206c777ea82f75f6879414ae7f048f1c4e39ee4ac1ac30bb893761d9135581a822135e6cee5f106e7cd00334a3afb9df591897be579708be3e3661d2ec822eaa6566ed204ccc19ce3972b93a79831f545be8edb5367381d984415e455da3124da22ee53f23e816cfd25c2e6abd0a130fbc55b8cfd7d33f1dddbe417bb9f4518ed286a3ccd9ae3b4f6a72b8155075e3d6d81c291b4d5fceccbc7b1c95de7b90d8ef3892e9b77a800c0d24ff9339760da555769b3290e536be75fb5b2e9e00ef6766ec2be02721565d77d15535a4b94cd27adc3acd971dd9a4188d381d76254cc03cde381c1d59f395e10b891355a48a8c4ccc03fe552e6e2cda5625a3ae26bc8c73d8b43f805df97d8a7f09854dcd527e90b70fe3a72a3b7bfa3786b7dd8fbe428d08fb0c88b8d601c4597028bcf5f34fa11a9aab2c85e14177d27369ecac32d275e7a7095d8752a5afd97ac11eb97458773b5aef2de92924fdeed893c949136173e15dad04239afe8be6b51599c7d10ac00000000000000003c538b3197584201fe1eee80ae5a026f4843b29ccc0ea38816f4fc164e4622b4e6226321732ae88b83d249d25a5d3f3f0b92dc4d22500eecc257c8bf328720e8e03dd0ee132b26932e4e6a145efb8dfa79a6c5821d04d186091ae5229e7d35ec55602bca401bf19d60df6f80e95b4909e96cb237a09d1d6d1c0297c5029b0af9771489ae493380fefe6256edeea6de341fa4b7034e499734db410a91b941452b00"}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 32) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) (rerun: 32) 11:10:26 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:26 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1300000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:26 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x38f01, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x38f01, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) (async) 11:10:26 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x800, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1a, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb28, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @jmp={0x5, 0x0, 0x7df5d9c1d265ec51, 0x8, 0x2, 0xf9a5bdaa8f8161c5, 0x8}, @exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @alu={0x7, 0x1, 0x8, 0x7, 0x3, 0x10, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x7e52, 0x13, &(0x7f0000000140)=""/19, 0x1f00, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x2, 0x401, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, r2, r3], &(0x7f0000000340)=[{0x5, 0x3, 0xc, 0x4}, {0x5, 0x1, 0xf, 0x2}], 0x10, 0x10}, 0x90) 11:10:26 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x1, 0x2, {"4b0b39171f9aec4ee190cdc5a63e94d0"}, 0x2, 0xfa32, 0x7}}}, 0xa0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@cgroup, 0x34, 0x0, 0x8001, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x5}}, 0x20) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000100)=0x4, 0x4) 11:10:27 executing program 1: ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x45, 0x1}) syz_io_uring_submit(0x0, 0x0, 0x0) (async) syz_io_uring_setup(0x6a21, &(0x7f00000001c0)={0x0, 0x0, 0x2000, 0x0, 0x24f}, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000040)=0x8) (async) epoll_create(0xfffff99b) (async) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000000080)={{0x80000000, 0x0, 0x1, [0xe51, 0x2]}, {0x80000000, 0x0, 0x0, [0x2, 0x53]}, 0x0, [0x2, 0x81]}) 11:10:27 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"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"}) (async) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"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"}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1400000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x800, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1a, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb28, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @jmp={0x5, 0x0, 0x7df5d9c1d265ec51, 0x8, 0x2, 0xf9a5bdaa8f8161c5, 0x8}, @exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @alu={0x7, 0x1, 0x8, 0x7, 0x3, 0x10, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x7e52, 0x13, &(0x7f0000000140)=""/19, 0x1f00, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x2, 0x401, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, r2, r3], &(0x7f0000000340)=[{0x5, 0x3, 0xc, 0x4}, {0x5, 0x1, 0xf, 0x2}], 0x10, 0x10}, 0x90) 11:10:27 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x38f01, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x38f01, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) (async) 11:10:27 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x1, 0x2, {"4b0b39171f9aec4ee190cdc5a63e94d0"}, 0x2, 0xfa32, 0x7}}}, 0xa0) (async) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@cgroup, 0x34, 0x0, 0x8001, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x5}}, 0x20) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000100)=0x4, 0x4) 11:10:27 executing program 2: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x1, 0x2, {"4b0b39171f9aec4ee190cdc5a63e94d0"}, 0x2, 0xfa32, 0x7}}}, 0xa0) (async) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@cgroup, 0x34, 0x0, 0x8001, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x5}}, 0x20) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000100)=0x4, 0x4) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd07) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1500000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x0, 0xffff, {"10d3b09efc9c13bdcd8d2a6a1b6db0d9"}, 0xffffffff, 0x9, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 11:10:27 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x800, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1a, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb28, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @jmp={0x5, 0x0, 0x7df5d9c1d265ec51, 0x8, 0x2, 0xf9a5bdaa8f8161c5, 0x8}, @exit, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @alu={0x7, 0x1, 0x8, 0x7, 0x3, 0x10, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x7e52, 0x13, &(0x7f0000000140)=""/19, 0x1f00, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x2, 0x401, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, r2, r3], &(0x7f0000000340)=[{0x5, 0x3, 0xc, 0x4}, {0x5, 0x1, 0xf, 0x2}], 0x10, 0x10}, 0x90) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1600000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd07) 11:10:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e24, 0xed, @private0, 0x4}, r0}}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) sendto$l2tp6(r1, &(0x7f0000000580)="63e9fdd317e5a3f760f57de96ba05306c319d8fd5bebec36ed9e649f375b9f53c3022cfcc9c65fb60d3ee6a0ba4c04dafd469d3010b1cbb38f1c639e602bc93961a34d51a1811e0d7dabe52890578fedeff55a2f881e9269e8b1377d332ab1355f69395a8f61d7cbb5fb20d3d45634c3ddc45dfcd7f4b1439c87f76c248fd130f03112f6a33f4376f28519b4e846fd33688615b4ad0d62ec956ca4c0c3ab912d17", 0xa1, 0x20000000, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000000007f0000008520000001000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000100)=""/45, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x4, 0x5, 0x7}, {0x5, 0x4, 0x2, 0x5}, {0x4, 0x1, 0x2, 0xa}, {0x3, 0x4, 0xf, 0xb}, {0x5, 0x5, 0x7, 0x1}, {0x0, 0x2, 0xa, 0xc}, {0x5, 0x5, 0xe, 0xb}, {0x4, 0x5, 0x5, 0x6}, {0x2, 0x4, 0xb, 0x6}, {0x1, 0x1, 0x4, 0x9}], 0x10, 0x6}, 0x90) 11:10:27 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x0, 0xffff, {"10d3b09efc9c13bdcd8d2a6a1b6db0d9"}, 0xffffffff, 0x9, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x1, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x0, 0xffff, {"10d3b09efc9c13bdcd8d2a6a1b6db0d9"}, 0xffffffff, 0x9, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) (async) 11:10:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x4, 0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @default, @default, @remote, @null, @remote, @default, @bcast]}, &(0x7f0000000080)=0x48) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @default, @rose, @default, @default, @default, @bcast, @default]}, &(0x7f00000001c0)=0x48) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) 11:10:27 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xe2ca}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x800}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x40000) epoll_create(0x67) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1700000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd07) 11:10:27 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x0, 0xffff, {"10d3b09efc9c13bdcd8d2a6a1b6db0d9"}, 0xffffffff, 0x9, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1800000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x4, 0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @default, @default, @remote, @null, @remote, @default, @bcast]}, &(0x7f0000000080)=0x48) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @default, @rose, @default, @default, @default, @bcast, @default]}, &(0x7f00000001c0)=0x48) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) socket$inet6_udplite(0xa, 0x2, 0x88) (async) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x4, 0x4) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @default, @default, @remote, @null, @remote, @default, @bcast]}, &(0x7f0000000080)=0x48) (async) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @default, @rose, @default, @default, @default, @bcast, @default]}, &(0x7f00000001c0)=0x48) (async) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) (async) 11:10:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e24, 0xed, @private0, 0x4}, r0}}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) sendto$l2tp6(r1, &(0x7f0000000580)="63e9fdd317e5a3f760f57de96ba05306c319d8fd5bebec36ed9e649f375b9f53c3022cfcc9c65fb60d3ee6a0ba4c04dafd469d3010b1cbb38f1c639e602bc93961a34d51a1811e0d7dabe52890578fedeff55a2f881e9269e8b1377d332ab1355f69395a8f61d7cbb5fb20d3d45634c3ddc45dfcd7f4b1439c87f76c248fd130f03112f6a33f4376f28519b4e846fd33688615b4ad0d62ec956ca4c0c3ab912d17", 0xa1, 0x20000000, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="85100000fbffffff1800000002000000000000000700009f1de3070074e4f9dae453a6d314fb5bccca11faf3087f47e920e89de786834933907bea8f4a52ea849614e925048b6080340eed2be9d5a6ece6a80c36e1a4b6a586f95e96f8d0299ca14dcaaff2a142a9e044be48e53f1ceb3f1df3b9676d34f83d538974f8746c76ccdd942b0cb6f5fbc32681e95129f102f44a5b609dd6f88964b58071a053dd703ec067721bbc33d504f49377f142d37c8b84736844d045eba40db45394d5aade512e60d731b51f4bdfde3348f0e9049f86fa5ce22c7f3bb47f9f1be6b0cbd2040404b08eaa1265a0e22f4c68990a9cccafa7948b4c35db874c07117d4d79d8150eb8caa198b171a82f7893fda3b19c3fe6a54338225ce285248dffa166d57acff88ecabea261776a66829b76845164ff2c1672baa318ae09e5", @ANYRES32=r2, @ANYBLOB="000000007f0000008520000001000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000100)=""/45, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x4, 0x5, 0x7}, {0x5, 0x4, 0x2, 0x5}, {0x4, 0x1, 0x2, 0xa}, {0x3, 0x4, 0xf, 0xb}, {0x5, 0x5, 0x7, 0x1}, {0x0, 0x2, 0xa, 0xc}, {0x5, 0x5, 0xe, 0xb}, {0x4, 0x5, 0x5, 0x6}, {0x2, 0x4, 0xb, 0x6}, {0x1, 0x1, 0x4, 0x9}], 0x10, 0x6}, 0x90) 11:10:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e24, 0xed, @private0, 0x4}, r0}}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) sendto$l2tp6(r1, &(0x7f0000000580)="63e9fdd317e5a3f760f57de96ba05306c319d8fd5bebec36ed9e649f375b9f53c3022cfcc9c65fb60d3ee6a0ba4c04dafd469d3010b1cbb38f1c639e602bc93961a34d51a1811e0d7dabe52890578fedeff55a2f881e9269e8b1377d332ab1355f69395a8f61d7cbb5fb20d3d45634c3ddc45dfcd7f4b1439c87f76c248fd130f03112f6a33f4376f28519b4e846fd33688615b4ad0d62ec956ca4c0c3ab912d17", 0xa1, 0x20000000, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="85100000fbffffff1800000002000000000000000700009f1de3070074e4f9dae453a6d314fb5bccca11faf3087f47e920e89de786834933907bea8f4a52ea849614e925048b6080340eed2be9d5a6ece6a80c36e1a4b6a586f95e96f8d0299ca14dcaaff2a142a9e044be48e53f1ceb3f1df3b9676d34f83d538974f8746c76ccdd942b0cb6f5fbc32681e95129f102f44a5b609dd6f88964b58071a053dd703ec067721bbc33d504f49377f142d37c8b84736844d045eba40db45394d5aade512e60d731b51f4bdfde3348f0e9049f86fa5ce22c7f3bb47f9f1be6b0cbd2040404b08eaa1265a0e22f4c68990a9cccafa7948b4c35db874c07117d4d79d8150eb8caa198b171a82f7893fda3b19c3fe6a54338225ce285248dffa166d57acff88ecabea261776a66829b76845164ff2c1672baa318ae09e5", @ANYRES32=r2, @ANYBLOB="000000007f0000008520000001000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000100)=""/45, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x4, 0x5, 0x7}, {0x5, 0x4, 0x2, 0x5}, {0x4, 0x1, 0x2, 0xa}, {0x3, 0x4, 0xf, 0xb}, {0x5, 0x5, 0x7, 0x1}, {0x0, 0x2, 0xa, 0xc}, {0x5, 0x5, 0xe, 0xb}, {0x4, 0x5, 0x5, 0x6}, {0x2, 0x4, 0xb, 0x6}, {0x1, 0x1, 0x4, 0x9}], 0x10, 0x6}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e24, 0xed, @private0, 0x4}, r0}}, 0x38) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) sendto$l2tp6(r1, &(0x7f0000000580)="63e9fdd317e5a3f760f57de96ba05306c319d8fd5bebec36ed9e649f375b9f53c3022cfcc9c65fb60d3ee6a0ba4c04dafd469d3010b1cbb38f1c639e602bc93961a34d51a1811e0d7dabe52890578fedeff55a2f881e9269e8b1377d332ab1355f69395a8f61d7cbb5fb20d3d45634c3ddc45dfcd7f4b1439c87f76c248fd130f03112f6a33f4376f28519b4e846fd33688615b4ad0d62ec956ca4c0c3ab912d17", 0xa1, 0x20000000, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000000007f0000008520000001000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x2d, &(0x7f0000000100)=""/45, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x4, 0x5, 0x7}, {0x5, 0x4, 0x2, 0x5}, {0x4, 0x1, 0x2, 0xa}, {0x3, 0x4, 0xf, 0xb}, {0x5, 0x5, 0x7, 0x1}, {0x0, 0x2, 0xa, 0xc}, {0x5, 0x5, 0xe, 0xb}, {0x4, 0x5, 0x5, 0x6}, {0x2, 0x4, 0xb, 0x6}, {0x1, 0x1, 0x4, 0x9}], 0x10, 0x6}, 0x90) (async) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1900000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x51) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010102, @dev={0xac, 0x14, 0x14, 0x24}}) exit(0x100000000) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xac052b) syz_open_dev$media(&(0x7f0000000100), 0x5, 0x300) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x44) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x2, 0x10001, 0x2, 0x2008, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) 11:10:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x4, 0x4) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @default, @default, @remote, @null, @remote, @default, @bcast]}, &(0x7f0000000080)=0x48) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @default, @rose, @default, @default, @default, @bcast, @default]}, &(0x7f00000001c0)=0x48) (async) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) 11:10:27 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xe2ca}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x800}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x40000) (async) epoll_create(0x67) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1a00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xac052b) syz_open_dev$media(&(0x7f0000000100), 0x5, 0x300) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x44) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x2, 0x10001, 0x2, 0x2008, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) 11:10:27 executing program 2: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="5d6f89474f9d488c", @ANYRES16=r0, @ANYBLOB="080029bd7000fcdbdf25110000000800150001000000080015004b75bd2108001500c0000000080015000000000008001500010000000800150001000000080015000100000067001500010000004cb799806b02f8f5e7b7f0d8ad0e000079ab0eae581933830e40"], 0x54}}, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000080)=[{}, {}, {}], 0x10, 0xe, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x4, 0x0, 0x3f, 0x2002, 0xffffffffffffffff, 0x2c3fc27e, '\x00', r1, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) 11:10:27 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x181001, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_NMI(r1, 0xae9a) 11:10:27 executing program 2: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="5d6f89474f9d488c", @ANYRES16=r0, @ANYBLOB="080029bd7000fcdbdf25110000000800150001000000080015004b75bd2108001500c0000000080015000000000008001500010000000800150001000000080015000100000067001500010000004cb799806b02f8f5e7b7f0d8ad0e000079ab0eae581933830e40"], 0x54}}, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000080)=[{}, {}, {}], 0x10, 0xe, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x1) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x4, 0x0, 0x3f, 0x2002, 0xffffffffffffffff, 0x2c3fc27e, '\x00', r1, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) 11:10:27 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1b00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:27 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xac052b) (async) syz_open_dev$media(&(0x7f0000000100), 0x5, 0x300) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x44) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x2, 0x10001, 0x2, 0x2008, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) (rerun: 32) 11:10:27 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x181001, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_NMI(r1, 0xae9a) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x181001, 0x0) (async) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) (async) ioctl$KVM_NMI(r1, 0xae9a) (async) 11:10:28 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x51) (async) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010102, @dev={0xac, 0x14, 0x14, 0x24}}) (async) exit(0x100000000) 11:10:28 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1c00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:28 executing program 2: r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="5d6f89474f9d488c", @ANYRES16=r0, @ANYBLOB="080029bd7000fcdbdf25110000000800150001000000080015004b75bd2108001500c0000000080015000000000008001500010000000800150001000000080015000100000067001500010000004cb799806b02f8f5e7b7f0d8ad0e000079ab0eae581933830e40"], 0x54}}, 0x8000) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000080)=[{}, {}, {}], 0x10, 0xe, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', r1, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x4, 0x0, 0x3f, 0x2002, 0xffffffffffffffff, 0x2c3fc27e, '\x00', r1, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x48) 11:10:28 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x181001, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_NMI(r1, 0xae9a) 11:10:28 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xe2ca}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x800}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x40000) (async) epoll_create(0x67) 11:10:28 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x7, 0x7800, 0x3, 0x8, {{0x15, 0x4, 0x3, 0x9, 0x54, 0x65, 0x0, 0x6, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @cipso={0x86, 0x10, 0x2, [{0x5, 0xa, "c9aaf7f776aff0c2"}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x29, 0x0, [{0x2, 0xa, "9bb144223150fc54"}, {0x1, 0x2}, {0x6, 0xf, "a7d1af4f1931f692d2ab41b690"}, {0x1, 0x4, "cf55"}, {0x0, 0x4, "6ad5"}]}]}}}}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:10:28 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1d00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:28 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x1d, 0x80808, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$netrom(r0, &(0x7f0000000040)=""/171, 0xab, 0x1000, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 11:10:28 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000000)={{0x2, 0x0, 0x80, {0x1, 0xd000, 0x4}}, "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", "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"}) 11:10:28 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x7, 0x7800, 0x3, 0x8, {{0x15, 0x4, 0x3, 0x9, 0x54, 0x65, 0x0, 0x6, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @cipso={0x86, 0x10, 0x2, [{0x5, 0xa, "c9aaf7f776aff0c2"}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x29, 0x0, [{0x2, 0xa, "9bb144223150fc54"}, {0x1, 0x2}, {0x6, 0xf, "a7d1af4f1931f692d2ab41b690"}, {0x1, 0x4, "cf55"}, {0x0, 0x4, "6ad5"}]}]}}}}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 11:10:28 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000040)={0x280000000000000, 0x100000, 0x7fff, 0x3, 0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:28 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1e00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:29 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x51) (async) ioctl$SIOCGETSGCNT(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={@private=0xa010102, @dev={0xac, 0x14, 0x14, 0x24}}) exit(0x100000000) 11:10:29 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000040)={0x280000000000000, 0x100000, 0x7fff, 0x3, 0x2}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:29 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x7, 0x7800, 0x3, 0x8, {{0x15, 0x4, 0x3, 0x9, 0x54, 0x65, 0x0, 0x6, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @cipso={0x86, 0x10, 0x2, [{0x5, 0xa, "c9aaf7f776aff0c2"}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x29, 0x0, [{0x2, 0xa, "9bb144223150fc54"}, {0x1, 0x2}, {0x6, 0xf, "a7d1af4f1931f692d2ab41b690"}, {0x1, 0x4, "cf55"}, {0x0, 0x4, "6ad5"}]}]}}}}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffff20) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x7, 0x7800, 0x3, 0x8, {{0x15, 0x4, 0x3, 0x9, 0x54, 0x65, 0x0, 0x6, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @cipso={0x86, 0x10, 0x2, [{0x5, 0xa, "c9aaf7f776aff0c2"}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x29, 0x0, [{0x2, 0xa, "9bb144223150fc54"}, {0x1, 0x2}, {0x6, 0xf, "a7d1af4f1931f692d2ab41b690"}, {0x1, 0x4, "cf55"}, {0x0, 0x4, "6ad5"}]}]}}}}}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) (async) 11:10:29 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x1f00000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:29 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x1d, 0x80808, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$netrom(r0, &(0x7f0000000040)=""/171, 0xab, 0x1000, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 11:10:29 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000000)={{0x2, 0x0, 0x80, {0x1, 0xd000, 0x4}}, "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", "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"}) epoll_create(0x67) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000000)={{0x2, 0x0, 0x80, {0x1, 0xd000, 0x4}}, "3134e423e97a63a3e854b3f407cd249934be4dc816b76ec2a514308756e75ab0fbc1ed5218d13daaf7934521d730b6d9c151b9ce7c42895d832443b76452d5206c800e1dec0563e8680e5c6192d30160c30942032377d6a52c26c07ef2f693f1215435f8f81bf882408764f74e33de9e211bdddb7f168234eed2b09d244fe48f252f141323f39b51121ca8a00544e867dd61ee1dc66774a1f2f7466e2fbf52efde9d0d5b68749fa5e9fe204a78eede9ae7cf13314671063bf96a694b23b97ce8a24b0531ffaf46bd755e1249f5ab1224950293ba5d47bfa758e34b8a94b32692f969fbd3efab9dd16132fd92b66b623a81a94cc9b5cb3a34a909374d5c4b41b73228bf690d209d72301d00411d9374a72e0181b09e66fe7fc676c0b943b854ed2ee5ebcfbfc01a0438c26efe06117fd2b0b7706cf5c8c46cbd0cbbf55b4779f005a300e53971882bb0898b1ee91534ba3cfc50fb505b3fa76e5b2b4fc4a7895c73e1d4b1ac2996eef19f51957fb2be331f55909fd3a29948345702a49e6204e744e16b06af66f028765371b372e1569117fe7a67df8707eb3daa2d779b609a563dd0b1acf77c5ee4aa402d3886e998e7412d9404c85bd3c61b9776b6a78eec9359fd746ea8e09ab14399cebbd85987a4344bc189b32bdbddf9ba5fa7d01dea905aca7cd631bcf2a213a3e954dce5164b21701d479362509c580304c3c97d4c9c31a1b89595fcb3da023e9b03ebe92b3e9c4e9dcec462644fe7f7a28d837fb7d00537b5aa90981a734fe342be219580d3020189f2622b694b080f26f2e71786c21c39b1b0855995ded1566c55efe5ea9f82caa535316fa608af88a55c829f7365ef21203a75b3ff28fb2250321ce941be1ac0aaea681aec3c022227a77dd962b9f40da8a871104d90dc7978d9d4553cc639fdafe84839c3734cb90ad5054801c211261c676c436f70f99a0bbf4b9cc15e607fd3d523cd218b0a6bbe1f2f19dab93c76258d1fc0de134d808fc4ea852c0eae37d9f3842a148883f337f20bbce8acd4495ee57c4f7ceefaa25b65ecb884c7f149e8433da65ee59a5a1218132ed4f5e92fcb85bb3308399a794d7cb1a817346b44d3ff079c38ac446c8abfbd67d1cd89a2809d7d0b1fd9adfa41973995a44cd399f212f2504073569a6ed67147277a3dfdd4799d00fdca7d05a1dc5e4951086b6902677bc08d3fe709a3c8a0319d1dc74134b256cee1d726afc9c3eff746a16771d1bea07333c69fbcdc93ea70d76fa3069069ab831f25fe70202eb9fdab1271657a9d71357c0a9d976fd4214e4642693ae2e959d06474fcd7d8f3eb39033dbf62216cc2acebdecc24e9d066d4f93440343080ffb9bc132b5c013dd1ed4dfa0fcc16f82fb909126b4f242e27ee6d70ef1a3d895975538adbf5a6a9d3614dffab4fb13e6d843ab9992719f6c6860fc197a3f5e0bf9c8b0925c8939801ab1616227e3394e18ff924d11030f40b9d3b7032dfb27bdfa24d7c4613286318440c06194b2c33c859e819940da111b42325fe16507024cfe5f2541640ef4abb889349eb5a4468dcee9c56ce82c96a59aae683a924ff97632f9a907d830c8fb2cb6f396b6510f814ba1ec8cec83d4d42a6c74cd91c1c6157bbe683a9e17afd296b44d9702df8f39514ce27342463074540bfc84b2215fff607144e600aec5eba0cedc80c0f70145800d913fda2335a935e9ff25edf9c9620c2d5e6011c5606baa89213f5ea1f999bebf5be3552047e1734a74207b77587097d49e68be428f88464b5a66e9f0286c21de99f43e5caacf2d5245f25c7b71d82ddf43354a4e6659387e46f416b7818ade0289674e3e7c2b1dc65528c470b5354bfa346a461d51a7937abeaa80bd337a6f32ad16f7d05331f01f1e14f7830a8834447e3bbef728dca39eb1747ff93aeca2dca8cae28590279907d7c78b6e0009be42737d01bff7a1370de52c77c2406349cdcdefd0843caf78399f9dcec028d043494cbc30f5f76e3e7f29be6cb2e0eb1972e3d1d17b8ec4550e582d745a696f393df4c2dd500c15197482b314e8991bf8446fb5804d38d905729b50a40c1c6e33ad7ffc3c6662352d9000663309e3d0a548874a3ddb041779117361a8654ca1cba10f42f5681bd7cc24618a78155e6bd8587e77dfab94a46caa61fe151895c572691e6771cd9b6e5f512e3c2473479ca6dbcc0583e754d3a8cbb24a371eb77d269f453f27521b9b0fed6751fa2403b0c5ed20e96c890fd09e7a89b05e5942cacf97e06c61627d9956d019c3100b69e2cbdfee00ad5e53814dafa82ba3cdf524b5536ef5441c05bae8fa79ffbac4ac2909508f94800100a184fe110317af803a9811823f1256b5b0e038ab244081fcae7ec4e28d96421139a09e509eb56f0fdf3a4eb447d0c627474d89ad1dd1cad828490e9aecff6405a6b381af25030e6edc15a15c47f659385580091951a1a39d6810103a5c80014a8c91a26da227f91f6f8f0d731561edad9acbc6a88631279eadfebe24518935ec6fd3b8b923bbd814cedd1d4e8f16a5973563392b32e5265e25c313a8e88ab766c1485e771c35fdd553b9f54bdddaf442ff5cda0b10fc30b8662c82829a5f6f438ed5740dd2d942a4ab856445df3bfc11461be8d173b086c56499599c2ec90c219afb9cd2764e81e397b21f15385f13b79c0f9493bee32558c3373ebaad33c04713714e234e706009f8133dcad5a1d1b8a42c439891c05b19ef7d35288a0f7588b5dffe5da2a75b1a20f2ed00a174bf2ec4c85202d087e05ba2bbe31996dd70fdb05f2551387be1c4967acc8b9c9ce7153cb4a8ae26f74371a8a9e3912ccc22f8b09f2f96e811da83d0a15cdc6b52777f790bcb50da5518e438d272df5490e0a202a923e42cd0aa96d7dbf380f1a1954af5d4566bce1c54f41d033cc2cedc5f7e9cb7fe99df4ef18491c3431fe55eecec946158b4ba2629ce7a9c413f79a8df0bbc10d03ba37638d284173bc587f26b470fb346fe85f827be7d0403dc258ac0908de08dd6f68c465c37ddb7c10dec647a80fc29d8f6e9862e8a737e24991fa3e75057c1dedaddaaa27f627c6de20f4f6b4700d8a01d728410cfd54417276ea1a2471ea603f6fb1315e9875da199ec8d1edf85e9c16dae113dd600e0fdae0fd8406c64708db6ae7d1501061ad86db2d32be6aac9150bfd280acde70a510badad889a2ac5bbc5c6777e09ca3c12b37371e3d8e93a53e77a1e88f2a583da62bd63b110076c6a063964f82e8796cab02ab837ff9c4631c5e7b8d2efe676d08055b74c0e77838b6edc7b3119be6f84c91814a50e95c1503b82ec5994a20d9f9fe699798e36defaecb345895d881f5691675679d772c9567cdb14d6d1423b8d4ebddedb1ab86c7aba6e1ce68b8a4292f2db2205f3c71bb0bc1cea6c2f4b76905bc54335b2df73361ee4bed9e88fbf4bff9d52a3442a62d2db0b9600cef1f516cd5142de40bb1ebb7960172fa6342b2353237ff7ce3ff019b47db087bf43137c6a961e280a7c68500fef91b8eff516195cc1b7644ff1083f60ebf7404c3fc0c81c3df9f6ad24de07957c07102e0bb1d002ed5641a4edc3677c10d066eb4ef2b612290c27b3d746dd0b32844f7befa6355f21ec3889621a3ce1f68507a401912d982118688714ed7ebdb7ac4f4dbc62137d676ae3f0a725aa72a24e23dafd5f8c40fc00c5343e3ca9721616bd0af18e78e2076612855987a95ff5a77e6bc06763f7821959130b66e6372771ecb2c4d32d3ee3f8d4bf71243a870f6239f9c85d116f4249bebdf250eb0fbda17c3f625b5bff48a1d7971b943d5c38b3397629bf38f4dea90ec41466065903ee1a280ac77d193898428197b994b3911e9423aa1040ae13b3fdd84c06e6960ac9f85577042158df009f1424455f39861e2c2c6e19bf2900a907cc01dfd31d0b8e76b2c89da2c75b99310785d4fb8a199cc6f56222d93eb49fad605ae1ba529f36c9ee48f08ca2af47dbbd9d98b48b1c606a406cdd5435277248acf9efd0eb6f0b961dbeea0ee07b5cff135039f97bd5b27a36481d7db11af0051ec662eb60fa2057ee1700030fc2dfe9be7e821423809f09629edbe12655c87629e1b39de2b4fdc605f28b178ebfba08e5593d2ccdeffa61c329955382e620075c32fc931702307be8594d262973f758548f529c7dec17461e4cf1eb4298c2301e761670e0a1c200b1857050a04b4870818d7ae2e16ddabf6c5398063af803b30afe026402c087aa1e763d131bc029b7b4e40cc3037076f933dc075fe6ac04c37e876a6443f86ff6abebaa194c8ba3fd322ee4aadea31c5d78a7df6af40a39e9fc16314e5b9149330b1085760caeac6ddd506496381316e60d01c56b22b0c7525815ed98942cc5505f66763a15ec8bc249a53950bce2af57c5de86f63cda71fa23f157cf7572f5e075e818106b176ca4e2e22deefc41511ba6d0dd223c0bfa83c0f54b8d46a7d00ae908c42b13029e41e8342ea58477cc91d797202348a718412dd2d7fad47a3f381e353d02bafdda20ae71ed7f4565261b7947e59e123a493b868138c4a2849912379cb5e3f2b8bb4789962f667688102dd128f977e2b9946b8be873a20a535a9d843f80c6fa23ccc3243f38996364fa71727b87ac65658ed7ba05df0c80a4fca65b9f3806989883abef02c4c69cf721d6106b24aef7f59a7811a8354dbeccbd34683024e8939c5ccb71a5baf4df7a257ced1b513399c0ac74a9e4470aa1020b6c5d01231e3a335fdb869d75272ea248f1be7915af3acef447d42978465c4b59621063814e51d61b797008ecd1e90249eb5298c156d50ab4ccffd4ac807e230b4f54976d7fd173e7a82159a9d6a9b7022077c66cf942955b3b4bd8050a04800dda50b1a6009e95a63b9157cc43c096f475802ba2fe2dbb02f8e7116d4e6965bd1422894ae550e213f7aa18955c55319dfbb1038ddc49cb3ed5294d24022b645e16106c3088279cb289c4b915319204b52db7298313bd1a3b290620c24f9ba3d0e2dacf91b1205cbdd3671ca24ce897fb0af35d7a7a9f6ad89211f573a5686f07e36b90bbc4ea40661c059c8b16ab997c1997f0465fd0a74f67b98419bdc5571443f32a2e7d03b3886168a6a75a8b17fb4f48646119ca3f06ce62f101c91f9ea8e4dd6892623aeebc3676c8d456e968a8d219efce85588bc0079fb14748733245450be81ece057168822d647ad4a38519084119f2802098d63fce1ef24df37f176186edf072e5de57a4d07538c1ecb3d7d3b8d7b7d2db009fda2ce92731c6b6877a5da84c1e158a5ff5db14f0599fca7163f4ffbb76f14b75d4fcf5a5ebf4254c7704852ea0eee80d271957e2b889e80625bd308f893f4fdde05c9ca3f9bbc13cd352f43c4e01974ae9aae3a007a4b1bf5a2ac05da3eb699844549fd144d181ba22a7a9417d234aa26238416bfa3d888ce90c6508ae7e8eabf1f4794e957a0627005918c73083ad6a6396f21d8d12bfd896bf7ad683d2829b326737a3280f77ce46de707b09b25ddae5c137b79ec03174b94ff2078a57c556dddeac068313a6ad01023ed85211a54731bd4aa626b2a8af22506d2ba89ea1f61266647f1be6aef1761974382cc370745cdd433620f03c60d5da9c9d2b41da163bde58bb850d4615e8374a2609b8f68a0fd319cb104400a1da032eff1118ca574fca77956e8c9b09d5fb527f8cead8f3973ea6cc4f930645b44d618e71364a1358ff2e51e73897c256e753411e1ed57b7f3828e07480a036cd0f05f25a09048021fb0832097", "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"}) (async) 11:10:29 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2000000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:29 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000040)={0x280000000000000, 0x100000, 0x7fff, 0x3, 0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:29 executing program 1: epoll_create(0x67) (async, rerun: 32) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 32) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000000)={{0x2, 0x0, 0x80, {0x1, 0xd000, 0x4}}, "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", "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"}) (rerun: 32) 11:10:29 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%-010d \x00'}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xe, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x7, 0x7, 0x100, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x94fe, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x2, 0x6}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x1, 0x3, 0x81}, 0x10, 0x0, r1, 0x4, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, r2, 0x1, r3, r4], &(0x7f0000000240)=[{0x2, 0x4, 0x1, 0xa}, {0x2, 0x1, 0xa, 0x5}, {0x0, 0x5, 0xb, 0xa}, {0x3, 0x2, 0xd, 0x8}], 0x10, 0x2}, 0x90) 11:10:29 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) socketpair(0x1d, 0x80808, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$netrom(r0, &(0x7f0000000040)=""/171, 0xab, 0x1000, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 11:10:29 executing program 2: socketpair(0x10, 0x6, 0xfcf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x3, 0x81, 0x40, @private2, @mcast1, 0x8, 0x7, 0x4, 0x80000000}}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x50102, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r2, r3, 0x2, 0x1, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl2\x00', r2, 0x2f, 0xa6, 0xff, 0x3, 0x48, @local, @empty, 0x8, 0x700, 0xa5f4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'syztnl2\x00', r4, 0x29, 0x1, 0x8, 0x404, 0x20, @dev={0xfe, 0x80, '\x00', 0x28}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x40, 0x10, 0x7ff, 0x1}}) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%-010d \x00'}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xe, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x7, 0x7, 0x100, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x94fe, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x2, 0x6}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x1, 0x3, 0x81}, 0x10, 0x0, r1, 0x4, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, r2, 0x1, r3, r4], &(0x7f0000000240)=[{0x2, 0x4, 0x1, 0xa}, {0x2, 0x1, 0xa, 0x5}, {0x0, 0x5, 0xb, 0xa}, {0x3, 0x2, 0xd, 0x8}], 0x10, 0x2}, 0x90) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2100000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 1: epoll_create(0x67) socketpair(0x8, 0x800, 0x5, &(0x7f0000000000)) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 11:10:30 executing program 2: socketpair(0x10, 0x6, 0xfcf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x3, 0x81, 0x40, @private2, @mcast1, 0x8, 0x7, 0x4, 0x80000000}}) (async, rerun: 32) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 64) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x50102, 0x0) (rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r2, r3, 0x2, 0x1, 0x1}, 0x48) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl2\x00', r2, 0x2f, 0xa6, 0xff, 0x3, 0x48, @local, @empty, 0x8, 0x700, 0xa5f4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'syztnl2\x00', r4, 0x29, 0x1, 0x8, 0x404, 0x20, @dev={0xfe, 0x80, '\x00', 0x28}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x40, 0x10, 0x7ff, 0x1}}) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x248f, 'syz1\x00', @default, 0x9, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0xe75c, 0x4) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000140)=0x6, &(0x7f0000000180)=0x4) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @remote, @null, @null, @default]}, &(0x7f0000000240)=0x48) 11:10:30 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000180)={0x5, 0xa7b, [{0x80000000, 0x0, 0x1}, {0x7f, 0x0, 0x100}, {0x8001, 0x0, 0xfffffffffffffffd}, {0x8, 0x0, 0x9}, {0x401}]}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x400080, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x28880, 0x0) r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x98ac0ef2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x4}}, 0x20) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:30 executing program 1: epoll_create(0x67) socketpair(0x8, 0x800, 0x5, &(0x7f0000000000)) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) epoll_create(0x67) (async) socketpair(0x8, 0x800, 0x5, &(0x7f0000000000)) (async) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) (async) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%-010d \x00'}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xe, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x7, 0x7, 0x100, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x94fe, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x2, 0x6}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x1, 0x3, 0x81}, 0x10, 0x0, r1, 0x4, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, r2, 0x1, r3, r4], &(0x7f0000000240)=[{0x2, 0x4, 0x1, 0xa}, {0x2, 0x1, 0xa, 0x5}, {0x0, 0x5, 0xb, 0xa}, {0x3, 0x2, 0xd, 0x8}], 0x10, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000140), &(0x7f0000000180)='%-010d \x00'}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xe, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x3, 0x7, 0x7, 0x100, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x94fe, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x2, 0x6}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0x1, 0x3, 0x81}, 0x10, 0x0, r1, 0x4, &(0x7f0000000200)=[0xffffffffffffffff, 0x1, r2, 0x1, r3, r4], &(0x7f0000000240)=[{0x2, 0x4, 0x1, 0xa}, {0x2, 0x1, 0xa, 0x5}, {0x0, 0x5, 0xb, 0xa}, {0x3, 0x2, 0xd, 0x8}], 0x10, 0x2}, 0x90) (async) 11:10:30 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000180)={0x5, 0xa7b, [{0x80000000, 0x0, 0x1}, {0x7f, 0x0, 0x100}, {0x8001, 0x0, 0xfffffffffffffffd}, {0x8, 0x0, 0x9}, {0x401}]}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x400080, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x28880, 0x0) (async) r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x98ac0ef2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x4}}, 0x20) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x4) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async, rerun: 32) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x248f, 'syz1\x00', @default, 0x9, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) (async, rerun: 32) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) (async) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0xe75c, 0x4) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000140)=0x6, &(0x7f0000000180)=0x4) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @remote, @null, @null, @default]}, &(0x7f0000000240)=0x48) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2200000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 2: socketpair(0x10, 0x6, 0xfcf, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x3, 0x81, 0x40, @private2, @mcast1, 0x8, 0x7, 0x4, 0x80000000}}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x50102, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r2, r3, 0x2, 0x1, 0x1}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r2, r3, 0x2, 0x1, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl2\x00', r2, 0x2f, 0xa6, 0xff, 0x3, 0x48, @local, @empty, 0x8, 0x700, 0xa5f4, 0x8}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'syztnl2\x00', r2, 0x2f, 0xa6, 0xff, 0x3, 0x48, @local, @empty, 0x8, 0x700, 0xa5f4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'syztnl2\x00', r4, 0x29, 0x1, 0x8, 0x404, 0x20, @dev={0xfe, 0x80, '\x00', 0x28}, @dev={0xfe, 0x80, '\x00', 0x11}, 0x40, 0x10, 0x7ff, 0x1}}) 11:10:30 executing program 1: epoll_create(0x67) (async) socketpair(0x8, 0x800, 0x5, &(0x7f0000000000)) (async) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x248f, 'syz1\x00', @default, 0x9, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) (async) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0xe75c, 0x4) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000140)=0x6, &(0x7f0000000180)=0x4) (async) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @remote, @null, @null, @default]}, &(0x7f0000000240)=0x48) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x2300000000000000, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x34, 0x0, "045740ca046e9463fec10e303ad49f7d4502b506b93d8a37c8de9c99df033684c0eef889ccacf51cc2cad12d434dd12cef767ddb16d3cca59c046fbaf8c4fef6ad070533272b0c85ecbec8f97b8d038b"}, 0xd8) write$yama_ptrace_scope(r0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000180)={"994a39fc3a1b1431d1f08b89265d5962dfb6ca6511ddd3e76f3126178d631e15322a44eb9f6210f8570ff8914b4cdf488173c95a15d220f39b543fc23821d1a69b13e8f8e2cb1e762425470621709a6eda623ea42e3a80e3076e5cedcbdc24cb04b5871bfb1b106f4a2f1cafd6b42b102a24a87f503dc47bba99a97a3005df07162e2db221ddcd187ea92174ef322a35dddfff34d78a110a9ac7305b13c2e32f508b9441a50a06b08e62b927e9fe894cf2b07a167924b3ba32c17af965847499c0445baa445e33d2e7a9f97da21810a30438ebc16acba03ac7bed034548298deb3e092493f8f009f40ea9ec75a5af3426dde01c6579427bd04c0822acaeff7e1a21780fbf021353c995ea9d1e6402736ffa1a0badedc5870ac0653641da5623d976e5372ab8edcb7b2a194fa9e38a895cf8412822c381ebdf29197c73626dff85108da7075e802a6aa3fb994fbf43eccdb0149c40f6054d151465c10c9c045abf71d63873b1ee155f30616a05588d63fc31f4474cd978222723da02057277ec880b6b0be1b16ddee0f186566f9e096633b393a1a3b1f16615a3a8ef37565564db71ba01a003e9c9a6a676fb0bc4e8b3bddf13a473e1de9971f1c54ad8c02041162d81198549770048d348aff1692c3c12f3452070522d096e87a6129b5c9879f146db5de3efb637bbb2761662d1268f540bde5e98a09936e34a4e85fd58b95c7e1ea23037b5d4e65473c8860c763cffb1727d76ff379eee232b52074a3138375082c901737b9f22c3c51a258d3d89d273b8e1c5a78deb507c3378e53c297b335995a6c7e8b18aa685b84d2befa47796984f3a77a3e8058f358269a79042649d71615fd84df249126c2dcd0836d23232462c18375650f0650871a1ea403749e086a070ae3d6dd90da316acfeb6d376fff3c4911c5913b0978434fdb9e88cb86327724321ce559963b87a140b0640fd430b0f5bfcf558122a409c6543a8ce1198ff1640d36634f8d33c63bcc2b62b7132f350b5862d618122b9d36afba04f69ad9f05de774e4d33a4e4009ef505be0fe647e13a18c684f06fe42eb8275291042b981d4fe8bf490b922d0eecbd25e5ed787785b009d272e188027c236eee53bfc8f4072d21bcd274cd68b2c33c38db4b787aef3edfbe2d8f4b9ea0d86f6da6cb75008ced85bea787ef6f162fee9adb6d920149a21c313b2d5af28ddaf9caef2281c8005ee989c73bdf25102f880b92b5c4979b7d0db6138943d2c1540ed28d060bb93b5342e0341c6b8f21b14bcdcab096d8d7c8a371cf49b826bc93205114d2fc00716ba86ad93e2b4b8fce3d693c6976233c1e8417c3a2ae881e4b20a71a9bbcb4e137dfbed36d616aa2066a9c26320dcaf35d8dacde571ff71675b2352e08094e6e6c97378b3072244039da89a9b5ad5132a772294fb359488cffc65b5b12eb5"}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 11:10:30 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000180)={0x5, 0xa7b, [{0x80000000, 0x0, 0x1}, {0x7f, 0x0, 0x100}, {0x8001, 0x0, 0xfffffffffffffffd}, {0x8, 0x0, 0x9}, {0x401}]}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x400080, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x28880, 0x0) (async) r5 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x98ac0ef2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x4}}, 0x20) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x4) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0xffffffff, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x8000, 0x700, 0xfffffffd, 0x5}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = socket(0x8, 0x80000, 0x8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x24, 0x1c, 0x400, 0x70bd2a, 0x25dfdbfd, {0x1c, 0x0, 0x0, r0, 0x1, 0xa0, 0x6}, [@NDA_VNI={0x8, 0x7, 0x935}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x801) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000180)='syzkaller\x00', 0x41, 0x84, &(0x7f00000001c0)=""/132, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r1, r2], 0x0, 0x10, 0x1}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r5, &(0x7f0000000480)="bc0e9ce1465046c4e3efa3a7e46d183b829508d7d9b722264c13a0ef48015831a614cd894cce42284ee619ab9c45b24ebb15c26904fc5a17971ea9225898f1f29f7be51bcdd5f56c754d9b369127ce11f6d956a7808e22138cc28107985c6d8931e888521890ef655b31aacaddbabda61e0e4eff50d6938a0941fdff90015005d06563817e612918ca450e3dd30c8d522c4d9802cb6955f8b1", &(0x7f0000000540)=@udp6=r4, 0x1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x8, '\x00', r0, r4, 0x2, 0x2, 0x5}, 0x48) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@null, @rose, @rose, @rose, @netrom, @remote, @rose, @null]}, &(0x7f0000000080)=0x48) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x1a, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x34, 0x0, "045740ca046e9463fec10e303ad49f7d4502b506b93d8a37c8de9c99df033684c0eef889ccacf51cc2cad12d434dd12cef767ddb16d3cca59c046fbaf8c4fef6ad070533272b0c85ecbec8f97b8d038b"}, 0xd8) (async, rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000180)={"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"}) (async, rerun: 64) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) ioctl$RTC_UIE_ON(r0, 0x7003) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0xffffffff, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x8000, 0x700, 0xfffffffd, 0x5}}) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r3 = socket(0x8, 0x80000, 0x8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x24, 0x1c, 0x400, 0x70bd2a, 0x25dfdbfd, {0x1c, 0x0, 0x0, r0, 0x1, 0xa0, 0x6}, [@NDA_VNI={0x8, 0x7, 0x935}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x801) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000180)='syzkaller\x00', 0x41, 0x84, &(0x7f00000001c0)=""/132, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r1, r2], 0x0, 0x10, 0x1}, 0x90) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async, rerun: 64) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r5, &(0x7f0000000480)="bc0e9ce1465046c4e3efa3a7e46d183b829508d7d9b722264c13a0ef48015831a614cd894cce42284ee619ab9c45b24ebb15c26904fc5a17971ea9225898f1f29f7be51bcdd5f56c754d9b369127ce11f6d956a7808e22138cc28107985c6d8931e888521890ef655b31aacaddbabda61e0e4eff50d6938a0941fdff90015005d06563817e612918ca450e3dd30c8d522c4d9802cb6955f8b1", &(0x7f0000000540)=@udp6=r4, 0x1}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x8, '\x00', r0, r4, 0x2, 0x2, 0x5}, 0x48) 11:10:30 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) epoll_create(0x67) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@null, @rose, @rose, @rose, @netrom, @remote, @rose, @null]}, &(0x7f0000000080)=0x48) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@null, @rose, @rose, @rose, @netrom, @remote, @rose, @null]}, &(0x7f0000000080)=0x48) (async) 11:10:30 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) write$yama_ptrace_scope(r0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20040081) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000000), 0x8) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@null, @rose, @rose, @rose, @netrom, @remote, @rose, @null]}, &(0x7f0000000080)=0x48) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@null, @rose, @rose, @rose, @netrom, @remote, @rose, @null]}, &(0x7f0000000080)=0x48) (async) 11:10:30 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) epoll_create(0x67) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) epoll_create(0x67) (async) 11:10:30 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20040081) (async) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) (async) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000000), 0x8) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) (async) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x34, 0x0, "045740ca046e9463fec10e303ad49f7d4502b506b93d8a37c8de9c99df033684c0eef889ccacf51cc2cad12d434dd12cef767ddb16d3cca59c046fbaf8c4fef6ad070533272b0c85ecbec8f97b8d038b"}, 0xd8) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000180)={"994a39fc3a1b1431d1f08b89265d5962dfb6ca6511ddd3e76f3126178d631e15322a44eb9f6210f8570ff8914b4cdf488173c95a15d220f39b543fc23821d1a69b13e8f8e2cb1e762425470621709a6eda623ea42e3a80e3076e5cedcbdc24cb04b5871bfb1b106f4a2f1cafd6b42b102a24a87f503dc47bba99a97a3005df07162e2db221ddcd187ea92174ef322a35dddfff34d78a110a9ac7305b13c2e32f508b9441a50a06b08e62b927e9fe894cf2b07a167924b3ba32c17af965847499c0445baa445e33d2e7a9f97da21810a30438ebc16acba03ac7bed034548298deb3e092493f8f009f40ea9ec75a5af3426dde01c6579427bd04c0822acaeff7e1a21780fbf021353c995ea9d1e6402736ffa1a0badedc5870ac0653641da5623d976e5372ab8edcb7b2a194fa9e38a895cf8412822c381ebdf29197c73626dff85108da7075e802a6aa3fb994fbf43eccdb0149c40f6054d151465c10c9c045abf71d63873b1ee155f30616a05588d63fc31f4474cd978222723da02057277ec880b6b0be1b16ddee0f186566f9e096633b393a1a3b1f16615a3a8ef37565564db71ba01a003e9c9a6a676fb0bc4e8b3bddf13a473e1de9971f1c54ad8c02041162d81198549770048d348aff1692c3c12f3452070522d096e87a6129b5c9879f146db5de3efb637bbb2761662d1268f540bde5e98a09936e34a4e85fd58b95c7e1ea23037b5d4e65473c8860c763cffb1727d76ff379eee232b52074a3138375082c901737b9f22c3c51a258d3d89d273b8e1c5a78deb507c3378e53c297b335995a6c7e8b18aa685b84d2befa47796984f3a77a3e8058f358269a79042649d71615fd84df249126c2dcd0836d23232462c18375650f0650871a1ea403749e086a070ae3d6dd90da316acfeb6d376fff3c4911c5913b0978434fdb9e88cb86327724321ce559963b87a140b0640fd430b0f5bfcf558122a409c6543a8ce1198ff1640d36634f8d33c63bcc2b62b7132f350b5862d618122b9d36afba04f69ad9f05de774e4d33a4e4009ef505be0fe647e13a18c684f06fe42eb8275291042b981d4fe8bf490b922d0eecbd25e5ed787785b009d272e188027c236eee53bfc8f4072d21bcd274cd68b2c33c38db4b787aef3edfbe2d8f4b9ea0d86f6da6cb75008ced85bea787ef6f162fee9adb6d920149a21c313b2d5af28ddaf9caef2281c8005ee989c73bdf25102f880b92b5c4979b7d0db6138943d2c1540ed28d060bb93b5342e0341c6b8f21b14bcdcab096d8d7c8a371cf49b826bc93205114d2fc00716ba86ad93e2b4b8fce3d693c6976233c1e8417c3a2ae881e4b20a71a9bbcb4e137dfbed36d616aa2066a9c26320dcaf35d8dacde571ff71675b2352e08094e6e6c97378b3072244039da89a9b5ad5132a772294fb359488cffc65b5b12eb5"}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0xffffffff, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x8000, 0x700, 0xfffffffd, 0x5}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = socket(0x8, 0x80000, 0x8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x24, 0x1c, 0x400, 0x70bd2a, 0x25dfdbfd, {0x1c, 0x0, 0x0, r0, 0x1, 0xa0, 0x6}, [@NDA_VNI={0x8, 0x7, 0x935}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x801) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000180)='syzkaller\x00', 0x41, 0x84, &(0x7f00000001c0)=""/132, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r1, r2], 0x0, 0x10, 0x1}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r5, &(0x7f0000000480)="bc0e9ce1465046c4e3efa3a7e46d183b829508d7d9b722264c13a0ef48015831a614cd894cce42284ee619ab9c45b24ebb15c26904fc5a17971ea9225898f1f29f7be51bcdd5f56c754d9b369127ce11f6d956a7808e22138cc28107985c6d8931e888521890ef655b31aacaddbabda61e0e4eff50d6938a0941fdff90015005d06563817e612918ca450e3dd30c8d522c4d9802cb6955f8b1", &(0x7f0000000540)=@udp6=r4, 0x1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x8, '\x00', r0, r4, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0xffffffff, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, 0x8000, 0x700, 0xfffffffd, 0x5}}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) socket(0x8, 0x80000, 0x8) (async) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x24, 0x1c, 0x400, 0x70bd2a, 0x25dfdbfd, {0x1c, 0x0, 0x0, r0, 0x1, 0xa0, 0x6}, [@NDA_VNI={0x8, 0x7, 0x935}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x801) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000180)='syzkaller\x00', 0x41, 0x84, &(0x7f00000001c0)=""/132, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, r1, r2], 0x0, 0x10, 0x1}, 0x90) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r5, &(0x7f0000000480)="bc0e9ce1465046c4e3efa3a7e46d183b829508d7d9b722264c13a0ef48015831a614cd894cce42284ee619ab9c45b24ebb15c26904fc5a17971ea9225898f1f29f7be51bcdd5f56c754d9b369127ce11f6d956a7808e22138cc28107985c6d8931e888521890ef655b31aacaddbabda61e0e4eff50d6938a0941fdff90015005d06563817e612918ca450e3dd30c8d522c4d9802cb6955f8b1", &(0x7f0000000540)=@udp6=r4, 0x1}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x8, '\x00', r0, r4, 0x2, 0x2, 0x5}, 0x48) (async) 11:10:30 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x6, @mcast2}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x7f, @empty, 0xed}, @in={0x2, 0x4e20, @remote}], 0x64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$igmp(0x2, 0x3, 0x2) socketpair(0x2b, 0x2, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x3, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000200)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x6, 0xda, &(0x7f00000006c0)=""/218, 0x41100, 0x15, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x1, 0xf, 0x480000, 0x3ff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000800)=[r0], &(0x7f0000000840)=[{0x3, 0x5, 0x5, 0x9}, {0x3, 0x4, 0xf, 0x4}, {0x5, 0x4, 0xf, 0xa}, {0x2, 0x5, 0xa}, {0x0, 0x4, 0x10, 0xa}], 0x10, 0x4000000}, 0x90) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x0, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x14, 0x19, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000300000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000c0b5000000001000850000000c000000b70000000000000085200000020000009500000000000000b7080000000000007b8af8ff00000000b7080000530000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000070400004405e83c472189eda288fc6bae742bd8f0ffffffb702000008000000182300009b3ce83c900789b4a855d362ba5242afc77a0f278113b13b2e87cc3aea0ce405251dc73392bef4cfa237cf79e3203fea837991ba4f48b08351bcc9c38948c255d5a8461f9f908a0ecac246f506c6bd97d8aea28fb51fd9b33038", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x8001, 0x17, &(0x7f00000004c0)=""/23, 0x41000, 0x22, '\x00', 0x0, 0x2e, r3, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, r4, 0x6, &(0x7f0000000a00)=[r5, r0, r0, r6], &(0x7f0000000a40)=[{0x0, 0x1, 0x0, 0x3}, {0x4, 0x1, 0xf, 0x3}, {0x0, 0x2, 0x8}, {0x1, 0x2, 0x2}, {0x3, 0x4, 0x8, 0xc}, {0x3, 0x4, 0x9, 0x1}], 0x10, 0x401}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xfffffffffffffc8c, 0x0}, 0x10) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r7, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x7, 0x2, 0x3, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000b80)={0x9, 0xed, [{0x8, 0x0, 0x3}, {0x10000, 0x0, 0x20}, {0x3, 0x0, 0x1}, {0x7ff, 0x0, 0xfff}, {0x95bf, 0x0, 0x5}, {0xfb5e, 0x0, 0x332a}, {0x2, 0x0, 0x1}, {0x1, 0x0, 0x3f}, {0x2c6176fe, 0x0, 0x53e}]}) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000000), &(0x7f00000000c0)}) 11:10:30 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20040081) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) (async) write$khugepaged_scan(0xffffffffffffffff, &(0x7f0000000000), 0x8) 11:10:30 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) epoll_create(0x67) 11:10:30 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23459, 0x0, 0x0, 0x1}) 11:10:30 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0xb8a, @remote, 0x200}}}, 0x38) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r0, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000240)=[{}, {}, {}], 0x0, 0x0, '\x00', 0x2, 0x3}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e22, 0x1f, @mcast2, 0x5}}}, 0x38) 11:10:30 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:30 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x6, @mcast2}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x7f, @empty, 0xed}, @in={0x2, 0x4e20, @remote}], 0x64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$igmp(0x2, 0x3, 0x2) socketpair(0x2b, 0x2, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x6, @mcast2}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x7f, @empty, 0xed}, @in={0x2, 0x4e20, @remote}], 0x64) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$igmp(0x2, 0x3, 0x2) (async) socketpair(0x2b, 0x2, 0x8, &(0x7f0000000000)) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23459, 0x0, 0x0, 0x1}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x10000000) (async) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23459, 0x0, 0x0, 0x1}) (async) 11:10:31 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000200)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x6, 0xda, &(0x7f00000006c0)=""/218, 0x41100, 0x15, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x1, 0xf, 0x480000, 0x3ff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000800)=[r0], &(0x7f0000000840)=[{0x3, 0x5, 0x5, 0x9}, {0x3, 0x4, 0xf, 0x4}, {0x5, 0x4, 0xf, 0xa}, {0x2, 0x5, 0xa}, {0x0, 0x4, 0x10, 0xa}], 0x10, 0x4000000}, 0x90) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x0, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x14, 0x19, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000300000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000c0b5000000001000850000000c000000b70000000000000085200000020000009500000000000000b7080000000000007b8af8ff00000000b7080000530000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000070400004405e83c472189eda288fc6bae742bd8f0ffffffb702000008000000182300009b3ce83c900789b4a855d362ba5242afc77a0f278113b13b2e87cc3aea0ce405251dc73392bef4cfa237cf79e3203fea837991ba4f48b08351bcc9c38948c255d5a8461f9f908a0ecac246f506c6bd97d8aea28fb51fd9b33038", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x8001, 0x17, &(0x7f00000004c0)=""/23, 0x41000, 0x22, '\x00', 0x0, 0x2e, r3, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, r4, 0x6, &(0x7f0000000a00)=[r5, r0, r0, r6], &(0x7f0000000a40)=[{0x0, 0x1, 0x0, 0x3}, {0x4, 0x1, 0xf, 0x3}, {0x0, 0x2, 0x8}, {0x1, 0x2, 0x2}, {0x3, 0x4, 0x8, 0xc}, {0x3, 0x4, 0x9, 0x1}], 0x10, 0x401}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xfffffffffffffc8c, 0x0}, 0x10) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r7, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x7, 0x2, 0x3, 0x3}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) (async) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000b80)={0x9, 0xed, [{0x8, 0x0, 0x3}, {0x10000, 0x0, 0x20}, {0x3, 0x0, 0x1}, {0x7ff, 0x0, 0xfff}, {0x95bf, 0x0, 0x5}, {0xfb5e, 0x0, 0x332a}, {0x2, 0x0, 0x1}, {0x1, 0x0, 0x3f}, {0x2c6176fe, 0x0, 0x53e}]}) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000000), &(0x7f00000000c0)}) 11:10:31 executing program 1: epoll_create(0x67) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB="0d040000000000000600000000000007000000000300000000e600000000", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x20040810) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0xb8a, @remote, 0x200}}}, 0x38) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r0, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000240)=[{}, {}, {}], 0x0, 0x0, '\x00', 0x2, 0x3}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e22, 0x1f, @mcast2, 0x5}}}, 0x38) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x5, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 3: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x6, @mcast2}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x7f, @empty, 0xed}, @in={0x2, 0x4e20, @remote}], 0x64) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$igmp(0x2, 0x3, 0x2) socketpair(0x2b, 0x2, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x6, @mcast2}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x7f, @empty, 0xed}, @in={0x2, 0x4e20, @remote}], 0x64) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$igmp(0x2, 0x3, 0x2) (async) socketpair(0x2b, 0x2, 0x8, &(0x7f0000000000)) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x110, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x23459, 0x0, 0x0, 0x1}) 11:10:31 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000200)) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x401}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='GPL\x00', 0x6, 0xda, &(0x7f00000006c0)=""/218, 0x41100, 0x15, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x1, 0xf, 0x480000, 0x3ff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000800)=[r0], &(0x7f0000000840)=[{0x3, 0x5, 0x5, 0x9}, {0x3, 0x4, 0xf, 0x4}, {0x5, 0x4, 0xf, 0xa}, {0x2, 0x5, 0xa}, {0x0, 0x4, 0x10, 0xa}], 0x10, 0x4000000}, 0x90) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x0, 0x5, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x14, 0x19, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000300000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000c0b5000000001000850000000c000000b70000000000000085200000020000009500000000000000b7080000000000007b8af8ff00000000b7080000530000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000000000070400004405e83c472189eda288fc6bae742bd8f0ffffffb702000008000000182300009b3ce83c900789b4a855d362ba5242afc77a0f278113b13b2e87cc3aea0ce405251dc73392bef4cfa237cf79e3203fea837991ba4f48b08351bcc9c38948c255d5a8461f9f908a0ecac246f506c6bd97d8aea28fb51fd9b33038", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x8001, 0x17, &(0x7f00000004c0)=""/23, 0x41000, 0x22, '\x00', 0x0, 0x2e, r3, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x4, 0x8, 0x3}, 0x10, 0xffffffffffffffff, r4, 0x6, &(0x7f0000000a00)=[r5, r0, r0, r6], &(0x7f0000000a40)=[{0x0, 0x1, 0x0, 0x3}, {0x4, 0x1, 0xf, 0x3}, {0x0, 0x2, 0x8}, {0x1, 0x2, 0x2}, {0x3, 0x4, 0x8, 0xc}, {0x3, 0x4, 0x9, 0x1}], 0x10, 0x401}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0xfffffffffffffc8c, 0x0}, 0x10) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r7, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x7, 0x2, 0x3, 0x3}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000b80)={0x9, 0xed, [{0x8, 0x0, 0x3}, {0x10000, 0x0, 0x20}, {0x3, 0x0, 0x1}, {0x7ff, 0x0, 0xfff}, {0x95bf, 0x0, 0x5}, {0xfb5e, 0x0, 0x332a}, {0x2, 0x0, 0x1}, {0x1, 0x0, 0x3f}, {0x2c6176fe, 0x0, 0x53e}]}) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000000), &(0x7f00000000c0)}) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x6, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3e) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) socket$phonet_pipe(0x23, 0x5, 0x2) 11:10:31 executing program 1: epoll_create(0x67) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) (rerun: 32) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB="0d040000000000000600000000000007000000000300000000e600000000", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x20040810) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3e) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3e) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e24, 0xb8a, @remote, 0x200}}}, 0x38) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r0, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000240)=[{}, {}, {}], 0x0, 0x0, '\x00', 0x2, 0x3}) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e22, 0x1f, @mcast2, 0x5}}}, 0x38) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x7, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) sigaltstack(&(0x7f0000000080)={&(0x7f0000000000)=""/81, 0x80000000, 0x51}, &(0x7f0000000140)={&(0x7f00000000c0)=""/113, 0x0, 0x71}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x14d, 0x3, 0x5, 0x1358, 0x1, 0xef, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xa}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200)="b89c93ae7547d25c7914f8bccd2a0845bad7ef9afa19816007929d76739f282e79441e613ad7f7819a1678db", &(0x7f0000000240)=@tcp6}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@newneigh={0x34, 0x1c, 0x53e95b786c251e86, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2}, [@NDA_DST_MAC={0xa, 0x1, @multicast}, @NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x10000040) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3e) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3e) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) 11:10:31 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) (async) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) sigaltstack(&(0x7f0000000080)={&(0x7f0000000000)=""/81, 0x80000000, 0x51}, &(0x7f0000000140)={&(0x7f00000000c0)=""/113, 0x0, 0x71}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x14d, 0x3, 0x5, 0x1358, 0x1, 0xef, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xa}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x14d, 0x3, 0x5, 0x1358, 0x1, 0xef, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xa}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200)="b89c93ae7547d25c7914f8bccd2a0845bad7ef9afa19816007929d76739f282e79441e613ad7f7819a1678db", &(0x7f0000000240)=@tcp6}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@newneigh={0x34, 0x1c, 0x53e95b786c251e86, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2}, [@NDA_DST_MAC={0xa, 0x1, @multicast}, @NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x10000040) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x8, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xc) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000100)='+$\x00') write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x4, 0x7d3a90ec, {"e8f9065509147c2ccdefddc69e2a8fff"}, 0x9, 0x80, 0x40}}}, 0xa0) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bind$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 11:10:31 executing program 1: epoll_create(0x67) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB="0d040000000000000600000000000007000000000300000000e600000000", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x20040810) epoll_create(0x67) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB="0d040000000000000600000000000007000000000300000000e600000000", @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x20040810) (async) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/230, 0xe6, 0x10000, &(0x7f0000000100)={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x9, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xc) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000100)='+$\x00') (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x4, 0x7d3a90ec, {"e8f9065509147c2ccdefddc69e2a8fff"}, 0x9, 0x80, 0x40}}}, 0xa0) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 11:10:31 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) (async) sigaltstack(&(0x7f0000000080)={&(0x7f0000000000)=""/81, 0x80000000, 0x51}, &(0x7f0000000140)={&(0x7f00000000c0)=""/113, 0x0, 0x71}) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x14d, 0x3, 0x5, 0x1358, 0x1, 0xef, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0xa}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200)="b89c93ae7547d25c7914f8bccd2a0845bad7ef9afa19816007929d76739f282e79441e613ad7f7819a1678db", &(0x7f0000000240)=@tcp6}, 0x20) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@newneigh={0x34, 0x1c, 0x53e95b786c251e86, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2}, [@NDA_DST_MAC={0xa, 0x1, @multicast}, @NDA_DST_MAC={0xa, 0x1, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x10000040) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/230, 0xe6, 0x10000, &(0x7f0000000100)={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xa, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_io_uring_setup(0x26de, &(0x7f0000000100)={0x0, 0x75e, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x4) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x40, 0x4007, @fd_index=0x3, 0x2, 0xfc2a, 0x649, 0x2, 0x0, {0x3}}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40800045}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="020026bd7000fddbdf25000000000c00160001080019000a01010240080000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 11:10:31 executing program 1: r0 = epoll_create(0x67) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x80000000, 0x3, 0x2031, r0, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x1}, 0x48) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_io_uring_setup(0x4b8, &(0x7f0000000180)={0x0, 0x18be, 0x4, 0x0, 0x234}, &(0x7f0000000100)=0x0, &(0x7f0000000200)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r3, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) r5 = socket(0x1, 0xa, 0x7) syz_io_uring_submit(r2, r4, &(0x7f0000000240)=@IORING_OP_SHUTDOWN={0x22, 0x10, 0x0, r5, 0x0, 0x0, 0x1, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x2008}, 0x18) 11:10:31 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/230, 0xe6, 0x10000, &(0x7f0000000100)={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 11:10:31 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0xe) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xc) (async) ioctl$DMA_BUF_SET_NAME_A(0xffffffffffffffff, 0x40046201, &(0x7f0000000100)='+$\x00') write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x4, 0x7d3a90ec, {"e8f9065509147c2ccdefddc69e2a8fff"}, 0x9, 0x80, 0x40}}}, 0xa0) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_io_uring_setup(0x26de, &(0x7f0000000100)={0x0, 0x75e, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x4) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x40, 0x4007, @fd_index=0x3, 0x2, 0xfc2a, 0x649, 0x2, 0x0, {0x3}}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40800045}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="020026bd7000fddbdf25000000000c00160001080019000a01010240080000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40800045}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="020026bd7000fddbdf25000000000c00160001080019000a01010240080000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xb, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0xe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0xe) (async) 11:10:31 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x3c1800, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x15, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x86da}, [@jmp={0x5, 0x0, 0x1, 0x9, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x4, 0x3, 0xc3d, 0x2}, @map_fd={0x18, 0xa}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000340)='syzkaller\x00', 0x7f, 0x2b, &(0x7f0000000100)=""/43, 0x41000, 0x2, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0xf31b, 0xa1}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x5, 0x3, 0x5, 0xa}, {0x3, 0x5, 0x8, 0x2}], 0x10, 0xfd}, 0x90) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:31 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x0, 0x0, 0x101, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@bridge_getneigh={0xac, 0x1e, 0x200, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_IFALIAS={0x14, 0x14, 'macvtap0\x00'}, @IFLA_WEIGHT={0x8, 0xf, 0x1}, @IFLA_OPERSTATE={0x5, 0x10, 0x4}, @IFLA_MASTER={0x8}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_LINK_NETNSID={0x8}, @IFLA_PHYS_SWITCH_ID={0x20, 0x24, "27e2a4227c239fc04c33288bf4c676dcee3eb0456bd65a308cf295c6"}, @IFLA_IFALIAS={0x14, 0x14, 'team0\x00'}, @IFLA_EXT_MASK={0x8, 0x1d, 0x1}, @IFLA_ALT_IFNAME={0x14, 0x35, 'bond_slave_1\x00'}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x20000100) 11:10:31 executing program 1: r0 = epoll_create(0x67) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x80000000, 0x3, 0x2031, r0, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x1}, 0x48) (async) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_io_uring_setup(0x4b8, &(0x7f0000000180)={0x0, 0x18be, 0x4, 0x0, 0x234}, &(0x7f0000000100)=0x0, &(0x7f0000000200)) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r3, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) r5 = socket(0x1, 0xa, 0x7) syz_io_uring_submit(r2, r4, &(0x7f0000000240)=@IORING_OP_SHUTDOWN={0x22, 0x10, 0x0, r5, 0x0, 0x0, 0x1, 0x0, 0x1}) (async) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x2008}, 0x18) 11:10:31 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0xe) 11:10:31 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x3c1800, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x15, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x86da}, [@jmp={0x5, 0x0, 0x1, 0x9, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x4, 0x3, 0xc3d, 0x2}, @map_fd={0x18, 0xa}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000340)='syzkaller\x00', 0x7f, 0x2b, &(0x7f0000000100)=""/43, 0x41000, 0x2, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0xf31b, 0xa1}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x5, 0x3, 0x5, 0xa}, {0x3, 0x5, 0x8, 0x2}], 0x10, 0xfd}, 0x90) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xc, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x0, 0x0, 0x101, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@bridge_getneigh={0xac, 0x1e, 0x200, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_IFALIAS={0x14, 0x14, 'macvtap0\x00'}, @IFLA_WEIGHT={0x8, 0xf, 0x1}, @IFLA_OPERSTATE={0x5, 0x10, 0x4}, @IFLA_MASTER={0x8}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_LINK_NETNSID={0x8}, @IFLA_PHYS_SWITCH_ID={0x20, 0x24, "27e2a4227c239fc04c33288bf4c676dcee3eb0456bd65a308cf295c6"}, @IFLA_IFALIAS={0x14, 0x14, 'team0\x00'}, @IFLA_EXT_MASK={0x8, 0x1d, 0x1}, @IFLA_ALT_IFNAME={0x14, 0x35, 'bond_slave_1\x00'}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x20000100) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x0, 0x0, 0x101, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@bridge_getneigh={0xac, 0x1e, 0x200, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_IFALIAS={0x14, 0x14, 'macvtap0\x00'}, @IFLA_WEIGHT={0x8, 0xf, 0x1}, @IFLA_OPERSTATE={0x5, 0x10, 0x4}, @IFLA_MASTER={0x8}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_LINK_NETNSID={0x8}, @IFLA_PHYS_SWITCH_ID={0x20, 0x24, "27e2a4227c239fc04c33288bf4c676dcee3eb0456bd65a308cf295c6"}, @IFLA_IFALIAS={0x14, 0x14, 'team0\x00'}, @IFLA_EXT_MASK={0x8, 0x1d, 0x1}, @IFLA_ALT_IFNAME={0x14, 0x35, 'bond_slave_1\x00'}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x20000100) (async) 11:10:31 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000200)={0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0]}) syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x18000) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000), &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1, 0x0, 0x0, r0}) 11:10:31 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) syz_io_uring_setup(0x26de, &(0x7f0000000100)={0x0, 0x75e, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x4) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x40, 0x4007, @fd_index=0x3, 0x2, 0xfc2a, 0x649, 0x2, 0x0, {0x3}}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40800045}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="020026bd7000fddbdf25000000000c00160001080019000a01010240080000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) syz_io_uring_setup(0x26de, &(0x7f0000000100)={0x0, 0x75e, 0x400}, &(0x7f0000000180), &(0x7f00000001c0)) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) (async) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x4) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x40, 0x4007, @fd_index=0x3, 0x2, 0xfc2a, 0x649, 0x2, 0x0, {0x3}}) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40800045}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="2800000079e3e365484a691bf288986b131bd00a633a979d3e6356986c3a272813359c642242bca12b5379750eb7093a2add12e7c5f24471d087e57a6864ad8c6a6fe2b21d461a4776da66c8378d8c8953cf87f5348877889f933b8cea8a4f08bdc00adaa353a5b310eae21b7613fb04e03bdc0b28e2d428364761c7b91c3f6421f2a7e143fb6c9b3303ba450b87fc4701ea38160efd1f45c8916a6034ac78c0999437c183278814dc081a08de02b62c9c441d8cd85eebf1020557327bd5875f457565173473da90020e22ff29afe25afa63223cefab660c079e30027780f4bc16aab10129cc6382fe893df54bcfd1bdc3ba6bce62d699552f22dab5c81cb44e2f307154b255f754a15a244cfe9f3c688e153ee913365dbf9c53975993e26a0f5bd79e1889cfc3f8c1", @ANYRES16=r4, @ANYBLOB="020026bd7000fddbdf25000000000c00160001080019000a01010240080000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) (async) 11:10:31 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x3c1800, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x15, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x86da}, [@jmp={0x5, 0x0, 0x1, 0x9, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x4, 0x3, 0xc3d, 0x2}, @map_fd={0x18, 0xa}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000340)='syzkaller\x00', 0x7f, 0x2b, &(0x7f0000000100)=""/43, 0x41000, 0x2, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0xf31b, 0xa1}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x5, 0x3, 0x5, 0xa}, {0x3, 0x5, 0x8, 0x2}], 0x10, 0xfd}, 0x90) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x3c1800, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x15, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x86da}, [@jmp={0x5, 0x0, 0x1, 0x9, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x4, 0x4, 0x3, 0xc3d, 0x2}, @map_fd={0x18, 0xa}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000340)='syzkaller\x00', 0x7f, 0x2b, &(0x7f0000000100)=""/43, 0x41000, 0x2, '\x00', 0x0, 0x19, r0, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x5, 0xf31b, 0xa1}, 0x10, 0xffffffffffffffff, r0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x5, 0x3, 0x5, 0xa}, {0x3, 0x5, 0x8, 0x2}], 0x10, 0xfd}, 0x90) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:31 executing program 1: r0 = epoll_create(0x67) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x80000000, 0x3, 0x2031, r0, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x1}, 0x48) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_io_uring_setup(0x4b8, &(0x7f0000000180)={0x0, 0x18be, 0x4, 0x0, 0x234}, &(0x7f0000000100), &(0x7f0000000200)) (async) syz_io_uring_setup(0x4b8, &(0x7f0000000180)={0x0, 0x18be, 0x4, 0x0, 0x234}, &(0x7f0000000100)=0x0, &(0x7f0000000200)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r3, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) r5 = socket(0x1, 0xa, 0x7) syz_io_uring_submit(r2, r4, &(0x7f0000000240)=@IORING_OP_SHUTDOWN={0x22, 0x10, 0x0, r5, 0x0, 0x0, 0x1, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x2008}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x2008}, 0x18) 11:10:31 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xd, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:31 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e26, 0xa70, @mcast1}}}, 0x8) 11:10:31 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x0, 0x0, 0x101, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@bridge_getneigh={0xac, 0x1e, 0x200, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_IFALIAS={0x14, 0x14, 'macvtap0\x00'}, @IFLA_WEIGHT={0x8, 0xf, 0x1}, @IFLA_OPERSTATE={0x5, 0x10, 0x4}, @IFLA_MASTER={0x8}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_LINK_NETNSID={0x8}, @IFLA_PHYS_SWITCH_ID={0x20, 0x24, "27e2a4227c239fc04c33288bf4c676dcee3eb0456bd65a308cf295c6"}, @IFLA_IFALIAS={0x14, 0x14, 'team0\x00'}, @IFLA_EXT_MASK={0x8, 0x1d, 0x1}, @IFLA_ALT_IFNAME={0x14, 0x35, 'bond_slave_1\x00'}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x20000100) 11:10:31 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000200)={0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0]}) (async) syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x18000) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000), &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1, 0x0, 0x0, r0}) 11:10:31 executing program 1: epoll_create(0x67) syz_open_dev$media(&(0x7f0000000000), 0x1f, 0x40a00) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xe, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x20a682, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18, r1}, 0xfffffffffffffec8) 11:10:32 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x4000) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x44) 11:10:32 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e26, 0xa70, @mcast1}}}, 0x8) 11:10:32 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000200)={0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0]}) syz_open_dev$dri(&(0x7f0000000000), 0x2, 0x18000) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000), &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1, 0x0, 0x0, r0}) 11:10:32 executing program 1: epoll_create(0x67) (async, rerun: 32) syz_open_dev$media(&(0x7f0000000000), 0x1f, 0x40a00) (rerun: 32) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xf, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x20a682, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18, r1}, 0xfffffffffffffec8) 11:10:32 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x4000) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x44) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x4000) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x44) (async) 11:10:32 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x102) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000840)) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x5, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000640)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x7, 0x1, 0x6, 0x1}) r3 = syz_open_dev$dri(&(0x7f0000000880), 0x3ff, 0x68100) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f0000000900)={0x2, 0x0, &(0x7f00000008c0)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000440)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x3, 0x8, 0x4, 0x0, r2}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000700)={0x1, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, r1, 0x0, r4, 0x0, r5, 0x0], &(0x7f0000000640), &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x3ff, 0x5], 0x0, 0xffff}) 11:10:32 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e26, 0xa70, @mcast1}}}, 0x8) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x10, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x20a682, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18, r1}, 0xfffffffffffffec8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x20a682, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18, r1}, 0xfffffffffffffec8) (async) 11:10:32 executing program 1: epoll_create(0x67) (async) syz_open_dev$media(&(0x7f0000000000), 0x1f, 0x40a00) 11:10:32 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x4000) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x44) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r0, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004000}, 0x4000) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x44) (async) 11:10:32 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x102) (async) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x102) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000840)) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x5, 0x6}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x5, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000640)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x7, 0x1, 0x6, 0x1}) r3 = syz_open_dev$dri(&(0x7f0000000880), 0x3ff, 0x68100) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f0000000900)={0x2, 0x0, &(0x7f00000008c0)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000440)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x3, 0x8, 0x4, 0x0, r2}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x6}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000700)={0x1, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, r1, 0x0, r4, 0x0, r5, 0x0], &(0x7f0000000640), &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x3ff, 0x5], 0x0, 0xffff}) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x11, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x402100, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xffffffffffffffa5) 11:10:32 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f000000", @ANYRES16=r0, @ANYBLOB="000425bd7000ffdbdf25130000000c0006000300000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) epoll_create(0x67) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r0, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) 11:10:32 executing program 0: ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000140)={'\x00', 0x3, 0x8, 0x0, 0x0, 0x1ff, 0x5000, 0x100000, '\x00', 0xb2ee7d6}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0xffffffffffffff6f) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x12, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x402100, 0x0) (rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xffffffffffffffa5) 11:10:32 executing program 3: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000580)) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x102) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000840)) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x5, 0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000640)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x7, 0x1, 0x6, 0x1}) r3 = syz_open_dev$dri(&(0x7f0000000880), 0x3ff, 0x68100) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f0000000900)={0x2, 0x0, &(0x7f00000008c0)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000440)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x3, 0x8, 0x4, 0x0, r2}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000700)={0x1, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, r1, 0x0, r4, 0x0, r5, 0x0], &(0x7f0000000640), &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x3ff, 0x5], 0x0, 0xffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x102) (async) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000840)) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x5, 0x6}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000640)={&(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x7, 0x1, 0x6, 0x1}) (async) syz_open_dev$dri(&(0x7f0000000880), 0x3ff, 0x68100) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f0000000900)={0x2, 0x0, &(0x7f00000008c0)=[0x0, 0x0]}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(0xffffffffffffffff, 0xc05064a7, &(0x7f0000000440)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[{}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x3, 0x8, 0x4, 0x0, r2}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000005c0)={&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x1, 0x3, 0x6}) (async) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000700)={0x1, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, r1, 0x0, r4, 0x0, r5, 0x0], &(0x7f0000000640), &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x3ff, 0x5], 0x0, 0xffff}) (async) 11:10:32 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f000000", @ANYRES16=r0, @ANYBLOB="000425bd7000ffdbdf25130000000c0006000300000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) epoll_create(0x67) (async) epoll_create(0x67) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r0, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x13, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 0: ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000140)={'\x00', 0x3, 0x8, 0x0, 0x0, 0x1ff, 0x5000, 0x100000, '\x00', 0xb2ee7d6}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0xffffffffffffff6f) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 11:10:32 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f000000", @ANYRES16=r0, @ANYBLOB="000425bd7000ffdbdf25130000000c0006000300000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000040}, 0x90) epoll_create(0x67) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r0, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20040000) 11:10:32 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x402100, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xffffffffffffffa5) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0xffffffffffffffa5) 11:10:32 executing program 3: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000580)) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x14, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008810}, 0x4008085) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0xfffffffffffffefe, 0x0}, 0x10) 11:10:32 executing program 1: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) epoll_create(0x4) 11:10:32 executing program 0: ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000140)={'\x00', 0x3, 0x8, 0x0, 0x0, 0x1ff, 0x5000, 0x100000, '\x00', 0xb2ee7d6}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0xffffffffffffff6f) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x15, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 5: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x85) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000005c0)='hybla\x00', 0x6) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000480)={0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f00000004c0)={&(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0], 0x7, 0x2, 0x2, 0x0, r2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)=@o_path={&(0x7f0000000540)='./file0\x00', 0x0, 0x4000, r1}, 0x18) 11:10:32 executing program 3: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000580)) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 1: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) (async) epoll_create(0x4) 11:10:32 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x2140, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newneigh={0x38, 0x1c, 0x200, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x20, 0x2, 0x2}, [@NDA_DST_IPV6={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NDA_PROBES={0x8, 0x4, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x20080}, 0x80) write$yama_ptrace_scope(r5, 0x0, 0x0) io_uring_setup(0x386d, &(0x7f0000000080)={0x0, 0xfe0c, 0x1000, 0x2, 0x4}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x32, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001004700000000002323ff0218110800ad3f8827237937cf18218dd1fcff0268de338c394228d3bbb969cfd9f9a26d2aed348aefaa1118a3eb9ab8c218c3a98b38cfc8b447c77c07f9f60614565f3aa1b2e897e45c82f3b5c712d3a5a477600046646a25db502181b8ff7ebad4561db3e842b66bb555ed177684622f2089ebf4a3727f9baea59d80a264ae5629ff2ad99a0ae459da940e3045c7a33c243e2ecd7a6e56d5459794e642663a4a79fb5178d7ed4bedb3c7be6fef5e781a7f84935747ab520a", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001800000005000000000000006b000000c431f4ff08000000c74680000400000018390000050000000000000000000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000850000002d000000183a0000030000000000000000000000b7080000000000007b8af8ff00000000b7080000ea6c00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x20, 0x98, &(0x7f0000000240)=""/152, 0x40f00, 0x16738fed9523cf70, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000300)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xfff, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0xffffffffffffffff, r4, 0x1, 0x1, r5, 0x1], &(0x7f00000003c0)=[{0x3, 0xfffffffe, 0x9}], 0x10, 0x7}, 0x90) 11:10:32 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008810}, 0x4008085) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0xfffffffffffffefe, 0x0}, 0x10) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000080)={'\x00', 0x1d20, 0xf628, 0x1f, 0x0, 0x40, 0x1000, 0xf000, '\x00', 0xfff}) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x16, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 5: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x85) (async) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x85) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000005c0)='hybla\x00', 0x6) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000480)={0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f00000004c0)={&(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0], 0x7, 0x2, 0x2, 0x0, r2}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f00000004c0)={&(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0], 0x7, 0x2, 0x2, 0x0, r2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)=@o_path={&(0x7f0000000540)='./file0\x00', 0x0, 0x4000, r1}, 0x18) 11:10:32 executing program 1: getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) epoll_create(0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) (async) epoll_create(0x4) (async) 11:10:32 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x2140, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async, rerun: 64) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async, rerun: 64) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) (async, rerun: 64) sendmsg$nl_route(r6, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newneigh={0x38, 0x1c, 0x200, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x20, 0x2, 0x2}, [@NDA_DST_IPV6={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NDA_PROBES={0x8, 0x4, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x20080}, 0x80) (async, rerun: 64) write$yama_ptrace_scope(r5, 0x0, 0x0) (async, rerun: 32) io_uring_setup(0x386d, &(0x7f0000000080)={0x0, 0xfe0c, 0x1000, 0x2, 0x4}) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x32, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001004700000000002323ff0218110800ad3f8827237937cf18218dd1fcff0268de338c394228d3bbb969cfd9f9a26d2aed348aefaa1118a3eb9ab8c218c3a98b38cfc8b447c77c07f9f60614565f3aa1b2e897e45c82f3b5c712d3a5a477600046646a25db502181b8ff7ebad4561db3e842b66bb555ed177684622f2089ebf4a3727f9baea59d80a264ae5629ff2ad99a0ae459da940e3045c7a33c243e2ecd7a6e56d5459794e642663a4a79fb5178d7ed4bedb3c7be6fef5e781a7f84935747ab520a", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001800000005000000000000006b000000c431f4ff08000000c74680000400000018390000050000000000000000000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000850000002d000000183a0000030000000000000000000000b7080000000000007b8af8ff00000000b7080000ea6c00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x20, 0x98, &(0x7f0000000240)=""/152, 0x40f00, 0x16738fed9523cf70, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000300)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xfff, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0xffffffffffffffff, r4, 0x1, 0x1, r5, 0x1], &(0x7f00000003c0)=[{0x3, 0xfffffffe, 0x9}], 0x10, 0x7}, 0x90) 11:10:32 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x7}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008810}, 0x4008085) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0xfffffffffffffefe, 0x0}, 0x10) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000080)={'\x00', 0x1d20, 0xf628, 0x1f, 0x0, 0x40, 0x1000, 0xf000, '\x00', 0xfff}) (async) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000080)={'\x00', 0x1d20, 0xf628, 0x1f, 0x0, 0x40, 0x1000, 0xf000, '\x00', 0xfff}) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x17, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:32 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x12400, 0x0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x38) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x10, 0x1, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}}}, 0xa0) epoll_create(0x67) 11:10:32 executing program 5: sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_LEVEL={0x44, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x85) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000005c0)='hybla\x00', 0x6) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000480)={0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f00000004c0)={&(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0], 0x7, 0x2, 0x2, 0x0, r2}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)=@o_path={&(0x7f0000000540)='./file0\x00', 0x0, 0x4000, r1}, 0x18) 11:10:32 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f0000000080)={'\x00', 0x1d20, 0xf628, 0x1f, 0x0, 0x40, 0x1000, 0xf000, '\x00', 0xfff}) (async, rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (rerun: 64) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:32 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) bind$netrom(r0, &(0x7f0000000040)={{0x3, @default, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0xe0182, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:33 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x2140, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x2140, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) (async) socket$inet_sctp(0x2, 0x1, 0x84) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newneigh={0x38, 0x1c, 0x200, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x20, 0x2, 0x2}, [@NDA_DST_IPV6={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NDA_PROBES={0x8, 0x4, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x20080}, 0x80) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) write$yama_ptrace_scope(r5, 0x0, 0x0) io_uring_setup(0x386d, &(0x7f0000000080)={0x0, 0xfe0c, 0x1000, 0x2, 0x4}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x32, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001004700000000002323ff0218110800ad3f8827237937cf18218dd1fcff0268de338c394228d3bbb969cfd9f9a26d2aed348aefaa1118a3eb9ab8c218c3a98b38cfc8b447c77c07f9f60614565f3aa1b2e897e45c82f3b5c712d3a5a477600046646a25db502181b8ff7ebad4561db3e842b66bb555ed177684622f2089ebf4a3727f9baea59d80a264ae5629ff2ad99a0ae459da940e3045c7a33c243e2ecd7a6e56d5459794e642663a4a79fb5178d7ed4bedb3c7be6fef5e781a7f84935747ab520a", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001800000005000000000000006b000000c431f4ff08000000c74680000400000018390000050000000000000000000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000850000002d000000183a0000030000000000000000000000b7080000000000007b8af8ff00000000b7080000ea6c00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x20, 0x98, &(0x7f0000000240)=""/152, 0x40f00, 0x16738fed9523cf70, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000300)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xfff, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0xffffffffffffffff, r4, 0x1, 0x1, r5, 0x1], &(0x7f00000003c0)=[{0x3, 0xfffffffe, 0x9}], 0x10, 0x7}, 0x90) 11:10:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) bind$netrom(r0, &(0x7f0000000040)={{0x3, @default, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:33 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x12400, 0x0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x38) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x10, 0x1, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}}}, 0xa0) (async) epoll_create(0x67) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x18, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) bind$netrom(r0, &(0x7f0000000040)={{0x3, @default, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:33 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0xe0182, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:33 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x80, '\x00', r0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x19, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x12400, 0x0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x38) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x10, 0x1, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}}}, 0xa0) epoll_create(0x67) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x12400, 0x0) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x38) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x10, 0x1, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}}}, 0xa0) (async) epoll_create(0x67) (async) 11:10:33 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x4c, 0xfc, 0x10001, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x10, 0x1000, 0x6}}) 11:10:33 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x80, '\x00', r0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x80, '\x00', r0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 11:10:33 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0xe0182, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1a, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000400)={0xd8b, 0x7fffffff, 0x7fffffff}) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x0, 0x2}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) ioctl$KVM_NMI(r0, 0xae9a) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x16, 0x0, @fd_index, 0x1, 0x0, 0x4, 0x1}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x210001, 0x0) futex(&(0x7f0000000340)=0x1, 0x82, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x1, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0xffff, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getpeername$netrom(r0, &(0x7f00000000c0)={{0x3, @null}, [@bcast, @rose, @default, @default, @bcast, @default, @bcast, @default]}, &(0x7f0000000140)=0x48) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000640)={&(0x7f0000000440)=[0x0], &(0x7f0000000480)=[{}, {}, {}, {}], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0], 0x4, 0x3, 0x1}) 11:10:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) socket(0x3, 0x6, 0x6fb7) syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair(0x1a, 0xa, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x6, 0x6, 0x8000) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x80, '\x00', r0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x80, '\x00', r0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) 11:10:33 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x4c, 0xfc, 0x10001, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x10, 0x1000, 0x6}}) 11:10:33 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x80000001, 0x101, 0x0, 0x3, 0x1, 0x619a, 0x6bd9, 0x9}, &(0x7f0000000040)={0x8, 0x7f, 0x3, 0x80, 0xfffffffffffffff9, 0x7, 0xffffffffffff5a73, 0x1f}, &(0x7f0000000080)={0x8001, 0x7ff, 0x3, 0xffffffffffff0001, 0x1, 0x4, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x9, 0x3, 0x8, 0x4, 0xfffffffffffffff9, 0xffffffffffffffff, 0xa25, 0x3}, &(0x7f00000001c0)={0x9, 0x2, 0x8000000000000000, 0xbb, 0x9, 0x100, 0x9, 0x5}, &(0x7f0000000200)={0x2, 0x6, 0x8000000000000001, 0x4, 0x8, 0x10000, 0xa413}, &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x4]}, 0x8}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1b, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000400)={0xd8b, 0x7fffffff, 0x7fffffff}) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x0, 0x2}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) ioctl$KVM_NMI(r0, 0xae9a) (async) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x16, 0x0, @fd_index, 0x1, 0x0, 0x4, 0x1}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x210001, 0x0) futex(&(0x7f0000000340)=0x1, 0x82, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x1, 0x0) (async) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0xffff, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) (async) getpeername$netrom(r0, &(0x7f00000000c0)={{0x3, @null}, [@bcast, @rose, @default, @default, @bcast, @default, @bcast, @default]}, &(0x7f0000000140)=0x48) (async) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000640)={&(0x7f0000000440)=[0x0], &(0x7f0000000480)=[{}, {}, {}, {}], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0], 0x4, 0x3, 0x1}) 11:10:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) socket(0x3, 0x6, 0x6fb7) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socketpair(0x1a, 0xa, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x6, 0x6, 0x8000) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x4c, 0xfc, 0x10001, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80, 0x10, 0x1000, 0x6}}) 11:10:33 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x69046122a67bb26d) 11:10:33 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x80000001, 0x101, 0x0, 0x3, 0x1, 0x619a, 0x6bd9, 0x9}, &(0x7f0000000040)={0x8, 0x7f, 0x3, 0x80, 0xfffffffffffffff9, 0x7, 0xffffffffffff5a73, 0x1f}, &(0x7f0000000080)={0x8001, 0x7ff, 0x3, 0xffffffffffff0001, 0x1, 0x4, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x9, 0x3, 0x8, 0x4, 0xfffffffffffffff9, 0xffffffffffffffff, 0xa25, 0x3}, &(0x7f00000001c0)={0x9, 0x2, 0x8000000000000000, 0xbb, 0x9, 0x100, 0x9, 0x5}, &(0x7f0000000200)={0x2, 0x6, 0x8000000000000001, 0x4, 0x8, 0x10000, 0xa413}, &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x4]}, 0x8}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x80000001, 0x101, 0x0, 0x3, 0x1, 0x619a, 0x6bd9, 0x9}, &(0x7f0000000040)={0x8, 0x7f, 0x3, 0x80, 0xfffffffffffffff9, 0x7, 0xffffffffffff5a73, 0x1f}, &(0x7f0000000080)={0x8001, 0x7ff, 0x3, 0xffffffffffff0001, 0x1, 0x4, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) (async) clock_gettime(0x0, &(0x7f0000000240)) (async) pselect6(0x40, &(0x7f0000000180)={0x9, 0x3, 0x8, 0x4, 0xfffffffffffffff9, 0xffffffffffffffff, 0xa25, 0x3}, &(0x7f00000001c0)={0x9, 0x2, 0x8000000000000000, 0xbb, 0x9, 0x100, 0x9, 0x5}, &(0x7f0000000200)={0x2, 0x6, 0x8000000000000001, 0x4, 0x8, 0x10000, 0xa413}, &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x4]}, 0x8}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1d, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) socket(0x3, 0x6, 0x6fb7) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socketpair(0x1a, 0xa, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x6, 0x6, 0x8000) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, 0x0, 0x0) 11:10:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x48000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x53, 0x0}, 0x10) 11:10:33 executing program 1: epoll_create(0x67) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) (async) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000400)={0xd8b, 0x7fffffff, 0x7fffffff}) syz_io_uring_setup(0x40d, &(0x7f0000000200)={0x0, 0x0, 0x2}, &(0x7f0000000280), &(0x7f00000002c0)=0x0) ioctl$KVM_NMI(r0, 0xae9a) (async) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x16, 0x0, @fd_index, 0x1, 0x0, 0x4, 0x1}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x210001, 0x0) futex(&(0x7f0000000340)=0x1, 0x82, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x1, 0x0) (async) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0xffff, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) (async) getpeername$netrom(r0, &(0x7f00000000c0)={{0x3, @null}, [@bcast, @rose, @default, @default, @bcast, @default, @bcast, @default]}, &(0x7f0000000140)=0x48) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000640)={&(0x7f0000000440)=[0x0], &(0x7f0000000480)=[{}, {}, {}, {}], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0], 0x4, 0x3, 0x1}) 11:10:33 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x80000001, 0x101, 0x0, 0x3, 0x1, 0x619a, 0x6bd9, 0x9}, &(0x7f0000000040)={0x8, 0x7f, 0x3, 0x80, 0xfffffffffffffff9, 0x7, 0xffffffffffff5a73, 0x1f}, &(0x7f0000000080)={0x8001, 0x7ff, 0x3, 0xffffffffffff0001, 0x1, 0x4, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x9, 0x3, 0x8, 0x4, 0xfffffffffffffff9, 0xffffffffffffffff, 0xa25, 0x3}, &(0x7f00000001c0)={0x9, 0x2, 0x8000000000000000, 0xbb, 0x9, 0x100, 0x9, 0x5}, &(0x7f0000000200)={0x2, 0x6, 0x8000000000000001, 0x4, 0x8, 0x10000, 0xa413}, &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x4]}, 0x8}) (async) pselect6(0x40, &(0x7f0000000180)={0x9, 0x3, 0x8, 0x4, 0xfffffffffffffff9, 0xffffffffffffffff, 0xa25, 0x3}, &(0x7f00000001c0)={0x9, 0x2, 0x8000000000000000, 0xbb, 0x9, 0x100, 0x9, 0x5}, &(0x7f0000000200)={0x2, 0x6, 0x8000000000000001, 0x4, 0x8, 0x10000, 0xa413}, &(0x7f0000000280)={r0, r1+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x4]}, 0x8}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1e, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), 0xffffffffffffffff) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x69046122a67bb26d) 11:10:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x48000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x53, 0x0}, 0x10) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x967f80, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0x18840, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r3, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) socket(0x25, 0x1, 0x80) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r0, 0x4068aea3, &(0x7f0000000080)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) getpeername$netrom(r5, &(0x7f00000002c0)={{0x3, @netrom}, [@bcast, @bcast, @netrom, @rose, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000340)=0x48) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$KVM_TRANSLATE(r6, 0xc018ae85, &(0x7f0000000100)={0x100000, 0x1, 0x3, 0x2, 0x7}) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x21, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:33 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7f, &(0x7f0000000040)=0x4) 11:10:33 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), 0xffffffffffffffff) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x69046122a67bb26d) 11:10:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x48000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0x53, 0x0}, 0x10) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x967f80, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0x18840, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r3, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) (async, rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) socket(0x25, 0x1, 0x80) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) (async) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r0, 0x4068aea3, &(0x7f0000000080)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) getpeername$netrom(r5, &(0x7f00000002c0)={{0x3, @netrom}, [@bcast, @bcast, @netrom, @rose, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000340)=0x48) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$KVM_TRANSLATE(r6, 0xc018ae85, &(0x7f0000000100)={0x100000, 0x1, 0x3, 0x2, 0x7}) 11:10:33 executing program 1: epoll_create(0x67) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7f, &(0x7f0000000040)=0x4) 11:10:33 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x22, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0xfffffffffffffe1d, 0x0}, 0x2f) 11:10:33 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x967f80, 0x0) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0x18840, 0x0) (async, rerun: 64) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r3, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 32) socket(0x25, 0x1, 0x80) (async, rerun: 32) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r0, 0x4068aea3, &(0x7f0000000080)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) getpeername$netrom(r5, &(0x7f00000002c0)={{0x3, @netrom}, [@bcast, @bcast, @netrom, @rose, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000340)=0x48) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$KVM_TRANSLATE(r6, 0xc018ae85, &(0x7f0000000100)={0x100000, 0x1, 0x3, 0x2, 0x7}) 11:10:33 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffee0) 11:10:33 executing program 1: epoll_create(0x67) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000080)='2\x00', 0x2) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x7f, &(0x7f0000000040)=0x4) 11:10:33 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) (async) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x23456}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) 11:10:33 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffee0) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x23, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}, 0x48) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0xfffffffffffffe1d, 0x0}, 0x2f) (rerun: 32) 11:10:33 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) 11:10:33 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x300, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:33 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) 11:10:34 executing program 1: epoll_create(0x67) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffee0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffee0) (async) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) 11:10:34 executing program 2: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0xfffffffffffffe1d, 0x0}, 0x2f) 11:10:34 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) (async) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x500, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 1: epoll_create(0x67) (async) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) (rerun: 32) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x1, 0x6, 0x40, @mcast2, @mcast1, 0x700, 0x20, 0x2, 0x25}}) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2d, 0x8, 0x84, 0x992, 0x40, @dev={0xfe, 0x80, '\x00', 0x42}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x700, 0x10000, 0x3}}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000200000000000020000000186b00000700000000400000ffffff7f18150000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xfffffff9, 0xf6, &(0x7f0000000080)=""/246, 0x40f00, 0x5, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x5, 0x2a, 0x7f}, 0x10, 0x1d123, 0xffffffffffffffff, 0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, r3, 0x1, r4, r5, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x0, 0x2, 0xc, 0x5}, {0x5, 0x4, 0xe, 0x1}, {0x4, 0x5, 0x9, 0xa}], 0x10, 0x10000}, 0x90) 11:10:34 executing program 1: epoll_create(0x67) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) epoll_create(0x67) (async) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x600, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001180)={'syztnl2\x00', &(0x7f0000001100)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x80, 0x8001, 0x53, @empty, @rand_addr=' \x01\x00', 0x8, 0x8, 0x3, 0x672}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000460000000000000008000000b592c0ff0000000018200000", @ANYRES32=r0, @ANYBLOB="00000000ff7f00001865000010000000000000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000010000000000008000000000"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x41000, 0x40, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000011c0)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001200)=[{0x0, 0x3, 0x9, 0x6}, {0x2, 0x1, 0x4, 0x8}, {0x5, 0x3, 0x7, 0x2}]}, 0x90) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2d, 0x8, 0x84, 0x992, 0x40, @dev={0xfe, 0x80, '\x00', 0x42}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x700, 0x10000, 0x3}}) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000200000000000020000000186b00000700000000400000ffffff7f18150000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xfffffff9, 0xf6, &(0x7f0000000080)=""/246, 0x40f00, 0x5, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x5, 0x2a, 0x7f}, 0x10, 0x1d123, 0xffffffffffffffff, 0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, r3, 0x1, r4, r5, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x0, 0x2, 0xc, 0x5}, {0x5, 0x4, 0xe, 0x1}, {0x4, 0x5, 0x9, 0xa}], 0x10, 0x10000}, 0x90) 11:10:34 executing program 1: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) epoll_create(0x67) 11:10:34 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x1, 0x6, 0x40, @mcast2, @mcast1, 0x700, 0x20, 0x2, 0x25}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x1, 0x6, 0x40, @mcast2, @mcast1, 0x700, 0x20, 0x2, 0x25}}) (async) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x700, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 1: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) (async) epoll_create(0x67) 11:10:34 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0xc2000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x9, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000200)={0x1, 0x0, r2}) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x7000000000000000, 0x5004, 0x8, 0x7, 0x3}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001180)={'syztnl2\x00', &(0x7f0000001100)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x80, 0x8001, 0x53, @empty, @rand_addr=' \x01\x00', 0x8, 0x8, 0x3, 0x672}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000460000000000000008000000b592c0ff0000000018200000", @ANYRES32=r0, @ANYBLOB="00000000ff7f00001865000010000000000000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000010000000000008000000000"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x41000, 0x40, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000011c0)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001200)=[{0x0, 0x3, 0x9, 0x6}, {0x2, 0x1, 0x4, 0x8}, {0x5, 0x3, 0x7, 0x2}]}, 0x90) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 64) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2d, 0x8, 0x84, 0x992, 0x40, @dev={0xfe, 0x80, '\x00', 0x42}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x700, 0x10000, 0x3}}) (async, rerun: 32) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000200000000000020000000186b00000700000000400000ffffff7f18150000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xfffffff9, 0xf6, &(0x7f0000000080)=""/246, 0x40f00, 0x5, '\x00', r1, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x5, 0x2a, 0x7f}, 0x10, 0x1d123, 0xffffffffffffffff, 0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, r3, 0x1, r4, r5, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x0, 0x2, 0xc, 0x5}, {0x5, 0x4, 0xe, 0x1}, {0x4, 0x5, 0x9, 0xa}], 0x10, 0x10000}, 0x90) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x1, 0x6, 0x40, @mcast2, @mcast1, 0x700, 0x20, 0x2, 0x25}}) 11:10:34 executing program 1: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) (async, rerun: 32) epoll_create(0x67) (rerun: 32) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x900, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0xc2000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x9, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000200)={0x1, 0x0, r2}) (async) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x7000000000000000, 0x5004, 0x8, 0x7, 0x3}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async, rerun: 64) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) syz_io_uring_submit(r0, r3, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x6, &(0x7f0000000000), 0x1, 0x1, 0x1}) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001180)={'syztnl2\x00', &(0x7f0000001100)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x80, 0x8001, 0x53, @empty, @rand_addr=' \x01\x00', 0x8, 0x8, 0x3, 0x672}}) (async, rerun: 64) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000460000000000000008000000b592c0ff0000000018200000", @ANYRES32=r0, @ANYBLOB="00000000ff7f00001865000010000000000000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000010000000000008000000000"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000100)=""/4096, 0x41000, 0x40, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000011c0)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001200)=[{0x0, 0x3, 0x9, 0x6}, {0x2, 0x1, 0x4, 0x8}, {0x5, 0x3, 0x7, 0x2}]}, 0x90) 11:10:34 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x4, 0x1, 0x400, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6ba7bc1b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xb, 0x0, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x5, &(0x7f0000000340)=[r3, 0x1, r4, 0x1, r5, r6, 0x1], &(0x7f0000000380)=[{0x3, 0x5, 0xb, 0x7}, {0x5, 0x3, 0x8, 0x1}, {0x1, 0x5, 0x1, 0xa}, {0x5, 0x1, 0x7, 0x6}, {0x0, 0x3, 0xa, 0xc}], 0x10, 0x5}, 0x90) syz_open_dev$rtc(&(0x7f0000000000), 0x81, 0x900) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) ioctl$RTC_AIE_OFF(r7, 0x7002) 11:10:34 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x4, 0x1, 0x400, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xa00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) syz_io_uring_submit(r0, r3, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x6, &(0x7f0000000000), 0x1, 0x1, 0x1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180), &(0x7f00000001c0)) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) (async) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) syz_io_uring_submit(r0, r3, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x6, &(0x7f0000000000), 0x1, 0x1, 0x1}) (async) 11:10:34 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0xc2000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x9, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000200)={0x1, 0x0, r2}) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x7000000000000000, 0x5004, 0x8, 0x7, 0x3}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0xc2000, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x9, 0x4, 0x5}) (async) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000200)={0x1, 0x0, r2}) (async) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x7000000000000000, 0x5004, 0x8, 0x7, 0x3}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, 0x0, 0x0) (async) 11:10:34 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x1b) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xb00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x4, 0x1, 0x400, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6ba7bc1b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xb, 0x0, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x5, &(0x7f0000000340)=[r3, 0x1, r4, 0x1, r5, r6, 0x1], &(0x7f0000000380)=[{0x3, 0x5, 0xb, 0x7}, {0x5, 0x3, 0x8, 0x1}, {0x1, 0x5, 0x1, 0xa}, {0x5, 0x1, 0x7, 0x6}, {0x0, 0x3, 0xa, 0xc}], 0x10, 0x5}, 0x90) (async, rerun: 64) syz_open_dev$rtc(&(0x7f0000000000), 0x81, 0x900) (async, rerun: 64) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$yama_ptrace_scope(r7, 0x0, 0x0) ioctl$RTC_AIE_OFF(r7, 0x7002) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xc00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 1: r0 = epoll_create(0x67) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'gre0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="658c570000fe4300000000ddff", @ANYRES32=0x0, @ANYBLOB="f8500001000000b48000000147b100dc00640000e0299078ac1414aa000000008654ffffffff0102050b4bcbc8c0de5f04d5f80008ae952109024c010983c7cbdb38897f020e2e1cfb398005340524eaeebe0509c67a7a1ed7e6330603600512f03ccd6989fcd07e4ca037fd95f5943d0004c9c8820328891b72640101017f00000164010101ac1e0001ac1414aa00000000442c0841e000000100000007640101010000306a00000000e5ffff06e000000200000070e0000002000001ff4410e02000dd965300000004000000928912befbc5b060ff53508c7f9d41a9b036359404010001000000e23a75f3047c57c97c561bb73b0e9c58501eeb0a1664eb5c049c0ee64c796095caf296816fb899324c8558c2e1943a98f935e55641435c66e4f4f410544beed0095a4d96db90790a83437e007061e20525c226eeacb550dd04322ac4ec95b0226b4b725c1d5c51246eca0a5f3984bc7c27e6b15d7ea4909263d6092d3e2dd386cdc6f390951ddb985f2439add6ca775487be754f582a56015ecc21791e2c2955caabbeadbad6038afe26f12d173d6141322931e6810000000000000070ffc2bef8e9cd713c74894560bd5e8967ac26f60407be92f274cadee79d7cd102fd20d4a5f0ebc3fd80b17d53fbf3c3fcd8087222c576145d90115820a57406f1a45a43c10b0461d78b5b5cf153baa9e50356b97c0c8826f669cb8fd878d6400985099adfa4755cddb37952f53d624a3097f837227e957d65ea042bdbe47b245546a9ae546007e753eb7298d435"]}) syz_io_uring_setup(0x1f4, &(0x7f0000000000)={0x0, 0x7868, 0x1, 0x2, 0x18d}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x8, 0x2000, @fd=r0, 0x7, &(0x7f0000000100)="7bf6d3de0f98c0de983de7d13ff49426a6cb4f1e51bcb91698459be5cd5649e95190bd103c5db81a407daaf3031d09bc73ccff85d641c3a006da5b06ba02592ebb13e1bfde23471c89da6281911b2caf93854535a911a0f419fe1c170437192ae49ec064db287c1bfe69676c90eea438cc04851f9f0d27fc29a329a24f7118ecd9", 0x81, 0x13, 0x1}) 11:10:34 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x1b) 11:10:34 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x2a, 0x1806, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@default, @rose, @null, @netrom, @default, @null, @rose, @null]}, &(0x7f00000000c0)=0x48) socket(0x28, 0x6, 0x80) 11:10:34 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) syz_io_uring_submit(r0, r3, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x6, &(0x7f0000000000), 0x1, 0x1, 0x1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) syz_io_uring_setup(0x5d8d, &(0x7f0000000100)={0x0, 0x0, 0x400}, &(0x7f0000000180), &(0x7f00000001c0)) (async) syz_io_uring_setup(0x40d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@del) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x40010, r2, 0x10000000) (async) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x2}) (async) syz_io_uring_submit(r0, r3, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x6, &(0x7f0000000000), 0x1, 0x1, 0x1}) (async) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6ba7bc1b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xb, 0x0, 0x2}, 0x10, 0xffffffffffffffff, r2, 0x5, &(0x7f0000000340)=[r3, 0x1, r4, 0x1, r5, r6, 0x1], &(0x7f0000000380)=[{0x3, 0x5, 0xb, 0x7}, {0x5, 0x3, 0x8, 0x1}, {0x1, 0x5, 0x1, 0xa}, {0x5, 0x1, 0x7, 0x6}, {0x0, 0x3, 0xa, 0xc}], 0x10, 0x5}, 0x90) (async) syz_open_dev$rtc(&(0x7f0000000000), 0x81, 0x900) (async, rerun: 32) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) (async) ioctl$RTC_AIE_OFF(r7, 0x7002) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xd00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x240000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x1b) 11:10:34 executing program 1: r0 = epoll_create(0x67) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'gre0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="658c570000fe4300000000ddff", @ANYRES32=0x0, @ANYBLOB="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"]}) (async) syz_io_uring_setup(0x1f4, &(0x7f0000000000)={0x0, 0x7868, 0x1, 0x2, 0x18d}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x8, 0x2000, @fd=r0, 0x7, &(0x7f0000000100)="7bf6d3de0f98c0de983de7d13ff49426a6cb4f1e51bcb91698459be5cd5649e95190bd103c5db81a407daaf3031d09bc73ccff85d641c3a006da5b06ba02592ebb13e1bfde23471c89da6281911b2caf93854535a911a0f419fe1c170437192ae49ec064db287c1bfe69676c90eea438cc04851f9f0d27fc29a329a24f7118ecd9", 0x81, 0x13, 0x1}) 11:10:34 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x2a, 0x1806, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@default, @rose, @null, @netrom, @default, @null, @rose, @null]}, &(0x7f00000000c0)=0x48) (async) socket(0x28, 0x6, 0x80) 11:10:34 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xe00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:34 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 11:10:34 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x280200, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000c200090000000008000000080000000100000081000000000000000b00c9e305000000fbffffff484400000900000000000000"]) 11:10:34 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x3}}, 0x20) 11:10:35 executing program 1: r0 = epoll_create(0x67) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'gre0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="658c570000fe4300000000ddff", @ANYRES32=0x0, @ANYBLOB="f8500001000000b48000000147b100dc00640000e0299078ac1414aa000000008654ffffffff0102050b4bcbc8c0de5f04d5f80008ae952109024c010983c7cbdb38897f020e2e1cfb398005340524eaeebe0509c67a7a1ed7e6330603600512f03ccd6989fcd07e4ca037fd95f5943d0004c9c8820328891b72640101017f00000164010101ac1e0001ac1414aa00000000442c0841e000000100000007640101010000306a00000000e5ffff06e000000200000070e0000002000001ff4410e02000dd965300000004000000928912befbc5b060ff53508c7f9d41a9b036359404010001000000e23a75f3047c57c97c561bb73b0e9c58501eeb0a1664eb5c049c0ee64c796095caf296816fb899324c8558c2e1943a98f935e55641435c66e4f4f410544beed0095a4d96db90790a83437e007061e20525c226eeacb550dd04322ac4ec95b0226b4b725c1d5c51246eca0a5f3984bc7c27e6b15d7ea4909263d6092d3e2dd386cdc6f390951ddb985f2439add6ca775487be754f582a56015ecc21791e2c2955caabbeadbad6038afe26f12d173d6141322931e6810000000000000070ffc2bef8e9cd713c74894560bd5e8967ac26f60407be92f274cadee79d7cd102fd20d4a5f0ebc3fd80b17d53fbf3c3fcd8087222c576145d90115820a57406f1a45a43c10b0461d78b5b5cf153baa9e50356b97c0c8826f669cb8fd878d6400985099adfa4755cddb37952f53d624a3097f837227e957d65ea042bdbe47b245546a9ae546007e753eb7298d435"]}) syz_io_uring_setup(0x1f4, &(0x7f0000000000)={0x0, 0x7868, 0x1, 0x2, 0x18d}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x8, 0x2000, @fd=r0, 0x7, &(0x7f0000000100)="7bf6d3de0f98c0de983de7d13ff49426a6cb4f1e51bcb91698459be5cd5649e95190bd103c5db81a407daaf3031d09bc73ccff85d641c3a006da5b06ba02592ebb13e1bfde23471c89da6281911b2caf93854535a911a0f419fe1c170437192ae49ec064db287c1bfe69676c90eea438cc04851f9f0d27fc29a329a24f7118ecd9", 0x81, 0x13, 0x1}) (async) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x8, 0x2000, @fd=r0, 0x7, &(0x7f0000000100)="7bf6d3de0f98c0de983de7d13ff49426a6cb4f1e51bcb91698459be5cd5649e95190bd103c5db81a407daaf3031d09bc73ccff85d641c3a006da5b06ba02592ebb13e1bfde23471c89da6281911b2caf93854535a911a0f419fe1c170437192ae49ec064db287c1bfe69676c90eea438cc04851f9f0d27fc29a329a24f7118ecd9", 0x81, 0x13, 0x1}) 11:10:35 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x2a, 0x1806, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@default, @rose, @null, @netrom, @default, @null, @rose, @null]}, &(0x7f00000000c0)=0x48) socket(0x28, 0x6, 0x80) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) socketpair(0x2a, 0x1806, 0x0, &(0x7f0000000000)) (async) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@default, @rose, @null, @netrom, @default, @null, @rose, @null]}, &(0x7f00000000c0)=0x48) (async) socket(0x28, 0x6, 0x80) (async) 11:10:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) (async) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xf00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x3}}, 0x20) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x280200, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x280200, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000c200090000000008000000080000000100000081000000000000000b00c9e305000000fbffffff484400000900000000000000"]) 11:10:35 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001400)=@IORING_OP_RECVMSG={0xa, 0x40, 0x6, r0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x4, &(0x7f00000012c0)=""/247, 0xf7}, 0x0, 0x122, 0x1, {0x1}}) 11:10:35 executing program 1: epoll_create(0x0) epoll_create(0x6) 11:10:35 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001400)=@IORING_OP_RECVMSG={0xa, 0x40, 0x6, r0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x4, &(0x7f00000012c0)=""/247, 0xf7}, 0x0, 0x122, 0x1, {0x1}}) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1200, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x3}}, 0x20) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x280200, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000000c200090000000008000000080000000100000081000000000000000b00c9e305000000fbffffff484400000900000000000000"]) 11:10:35 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001400)=@IORING_OP_RECVMSG={0xa, 0x40, 0x6, r0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x4, &(0x7f00000012c0)=""/247, 0xf7}, 0x0, 0x122, 0x1, {0x1}}) 11:10:35 executing program 1: epoll_create(0x0) epoll_create(0x6) epoll_create(0x0) (async) epoll_create(0x6) (async) 11:10:35 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1300, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x6, 0x3, 0x7fff, 0x6, 0x4}, {0x0, 0x4, 0xe6d4, 0x3, 0x5}]}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x10005, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x20) syz_io_uring_setup(0xfe7, &(0x7f0000000100)={0x0, 0xa167, 0x80, 0x1, 0x2b2}, &(0x7f0000000180), &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 11:10:35 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f00000006c0)={0x0, 0x2, 0x0, &(0x7f0000000040)=[{}, {}], 0xa, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x5, 0x0, &(0x7f00000005c0)=[{}, {}, {}, {}, {}]}) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x200, @loopback, 0xfffffffe, 0x3}, 0x20) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffffe) 11:10:35 executing program 5: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x6, 0x3, 0x7fff, 0x6, 0x4}, {0x0, 0x4, 0xe6d4, 0x3, 0x5}]}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x10005, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x20) (async) syz_io_uring_setup(0xfe7, &(0x7f0000000100)={0x0, 0xa167, 0x80, 0x1, 0x2b2}, &(0x7f0000000180), &(0x7f00000001c0)) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) (rerun: 32) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1400, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) 11:10:35 executing program 1: epoll_create(0x0) (async) epoll_create(0x0) epoll_create(0x6) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffffe) 11:10:35 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:35 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f00000006c0)={0x0, 0x2, 0x0, &(0x7f0000000040)=[{}, {}], 0xa, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x5, 0x0, &(0x7f00000005c0)=[{}, {}, {}, {}, {}]}) (async) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x200, @loopback, 0xfffffffe, 0x3}, 0x20) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1500, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 1: epoll_create(0xac11) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xffffffe1, '\x00', 0x0, r1, 0x1, 0x4, 0x2}, 0x48) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffffe) 11:10:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xffffffffffffff3f, 0x0}, 0x10) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1600, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x6, 0x3, 0x7fff, 0x6, 0x4}, {0x0, 0x4, 0xe6d4, 0x3, 0x5}]}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x10005, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x20) syz_io_uring_setup(0xfe7, &(0x7f0000000100)={0x0, 0xa167, 0x80, 0x1, 0x2b2}, &(0x7f0000000180), &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)={0x2, 0x0, [{0x6, 0x3, 0x7fff, 0x6, 0x4}, {0x0, 0x4, 0xe6d4, 0x3, 0x5}]}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x10005, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x20) (async) syz_io_uring_setup(0xfe7, &(0x7f0000000100)={0x0, 0xa167, 0x80, 0x1, 0x2b2}, &(0x7f0000000180), &(0x7f00000001c0)) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) (async) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0xb8, 0x8001, 0x1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0x6, 0x1}}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6b4ccda0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7ff, 0x749b, 0x5, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff17, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0xb, 0x7, 0x0, 0x4, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0xce, &(0x7f0000000200)=""/206, 0x40e00, 0x4d, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xe, 0x6, 0x8}, 0x10, 0x2a162, 0xffffffffffffffff, 0x4, &(0x7f0000000680)=[r1, r2, r3, r4, r5, r6], &(0x7f00000006c0)=[{0x0, 0x2, 0xf, 0x1}, {0x1, 0x3, 0x9}, {0x2, 0x3, 0xa, 0x6}, {0x4, 0x7f, 0xd, 0x5}], 0x10, 0x1}, 0x90) socket$igmp(0x2, 0x3, 0x2) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) 11:10:35 executing program 1: epoll_create(0xac11) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xffffffe1, '\x00', 0x0, r1, 0x1, 0x4, 0x2}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xffffffe1, '\x00', 0x0, r1, 0x1, 0x4, 0x2}, 0x48) 11:10:35 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f00000006c0)={0x0, 0x2, 0x0, &(0x7f0000000040)=[{}, {}], 0xa, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000580)=[{}], 0x5, 0x0, &(0x7f00000005c0)=[{}, {}, {}, {}, {}]}) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x200, @loopback, 0xfffffffe, 0x3}, 0x20) (async) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x200, @loopback, 0xfffffffe, 0x3}, 0x20) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xffffffffffffff3f, 0x0}, 0x10) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1700, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xffffffffffffff3f, 0x0}, 0x10) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0xb8, 0x8001, 0x1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0x6, 0x1}}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6b4ccda0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7ff, 0x749b, 0x5, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff17, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0xb, 0x7, 0x0, 0x4, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0xce, &(0x7f0000000200)=""/206, 0x40e00, 0x4d, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xe, 0x6, 0x8}, 0x10, 0x2a162, 0xffffffffffffffff, 0x4, &(0x7f0000000680)=[r1, r2, r3, r4, r5, r6], &(0x7f00000006c0)=[{0x0, 0x2, 0xf, 0x1}, {0x1, 0x3, 0x9}, {0x2, 0x3, 0xa, 0x6}, {0x4, 0x7f, 0xd, 0x5}], 0x10, 0x1}, 0x90) socket$igmp(0x2, 0x3, 0x2) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd94) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0xb8, 0x8001, 0x1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0x6, 0x1}}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6b4ccda0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7ff, 0x749b, 0x5, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff17, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0xb, 0x7, 0x0, 0x4, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0xce, &(0x7f0000000200)=""/206, 0x40e00, 0x4d, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xe, 0x6, 0x8}, 0x10, 0x2a162, 0xffffffffffffffff, 0x4, &(0x7f0000000680)=[r1, r2, r3, r4, r5, r6], &(0x7f00000006c0)=[{0x0, 0x2, 0xf, 0x1}, {0x1, 0x3, 0x9}, {0x2, 0x3, 0xa, 0x6}, {0x4, 0x7f, 0xd, 0x5}], 0x10, 0x1}, 0x90) (async) socket$igmp(0x2, 0x3, 0x2) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) (async) 11:10:35 executing program 1: epoll_create(0xac11) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xffffffe1, '\x00', 0x0, r1, 0x1, 0x4, 0x2}, 0x48) 11:10:35 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x0, 0x2, 0xfffffbff, 0xffffffff, 0x4}, {0x0, 0xfffffff8, 0x8, 0x1, 0x3}]}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1800, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000000)=""/40, 0x28, 0x80000121, 0x0, 0x0) 11:10:35 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x0, 0x2, 0xfffffbff, 0xffffffff, 0x4}, {0x0, 0xfffffff8, 0x8, 0x1, 0x3}]}) (async) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 11:10:35 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x5, 0x1, 0x3, 0x2000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x40, 0x400, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x80, 0x1, 0xffffffff}}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) write$yama_ptrace_scope(r1, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x20, &(0x7f0000000500)=@raw=[@tail_call, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff90c}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}], &(0x7f0000000600)='syzkaller\x00', 0x1000, 0xe6, &(0x7f0000000640)=""/230, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x9, 0x63}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000007c0)=[r0, r0, r3], &(0x7f0000000800)=[{0x0, 0x3, 0x5, 0x2}, {0x5, 0x4, 0x5, 0x4}, {0x3, 0x1, 0xc, 0x6}, {0x3, 0x1, 0x7, 0xb}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x2, 0x0, 0x4}], 0x10, 0x4}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4b}, [@ldst={0x3, 0x1, 0x3, 0x2, 0x7, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x32, &(0x7f0000000080)=""/50, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x4, 0x0, 0x306, 0x58}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r4, r7, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x5, 0x5, 0xb, 0xb}], 0x10, 0xc653}, 0x90) 11:10:35 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000000)=""/40, 0x28, 0x80000121, 0x0, 0x0) 11:10:35 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x0, 0x2, 0xfffffbff, 0xffffffff, 0x4}, {0x0, 0xfffffff8, 0x8, 0x1, 0x3}]}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x0, 0x2, 0xfffffbff, 0xffffffff, 0x4}, {0x0, 0xfffffff8, 0x8, 0x1, 0x3}]}) (async) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) (async) 11:10:35 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x5, 0x1, 0x3, 0x2000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x40, 0x400, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x80, 0x1, 0xffffffff}}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) write$yama_ptrace_scope(r1, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x20, &(0x7f0000000500)=@raw=[@tail_call, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff90c}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}], &(0x7f0000000600)='syzkaller\x00', 0x1000, 0xe6, &(0x7f0000000640)=""/230, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x9, 0x63}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000007c0)=[r0, r0, r3], &(0x7f0000000800)=[{0x0, 0x3, 0x5, 0x2}, {0x5, 0x4, 0x5, 0x4}, {0x3, 0x1, 0xc, 0x6}, {0x3, 0x1, 0x7, 0xb}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x2, 0x0, 0x4}], 0x10, 0x4}, 0x90) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4b}, [@ldst={0x3, 0x1, 0x3, 0x2, 0x7, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x32, &(0x7f0000000080)=""/50, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x4, 0x0, 0x306, 0x58}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r4, r7, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x5, 0x5, 0xb, 0xb}], 0x10, 0xc653}, 0x90) 11:10:35 executing program 1: epoll_create(0x9f) 11:10:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffd94) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0xb8, 0x8001, 0x1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x10, 0x6, 0x1}}) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6b4ccda0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7ff, 0x749b, 0x5, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff17, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0xb, 0x7, 0x0, 0x4, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x9, 0xce, &(0x7f0000000200)=""/206, 0x40e00, 0x4d, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xe, 0x6, 0x8}, 0x10, 0x2a162, 0xffffffffffffffff, 0x4, &(0x7f0000000680)=[r1, r2, r3, r4, r5, r6], &(0x7f00000006c0)=[{0x0, 0x2, 0xf, 0x1}, {0x1, 0x3, 0x9}, {0x2, 0x3, 0xa, 0x6}, {0x4, 0x7f, 0xd, 0x5}], 0x10, 0x1}, 0x90) (async) socket$igmp(0x2, 0x3, 0x2) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) 11:10:35 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1900, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:35 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) recvfrom$l2tp6(r0, &(0x7f0000000000)=""/40, 0x28, 0x80000121, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) recvfrom$l2tp6(r0, &(0x7f0000000000)=""/40, 0x28, 0x80000121, 0x0, 0x0) (async) 11:10:35 executing program 1: epoll_create(0x9f) epoll_create(0x9f) (async) 11:10:35 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x4) 11:10:36 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1854000007000000000000000000003158b05a9e9d072f12a6ec6900186a00000a000000000000003f000000"], &(0x7f0000000140)='syzkaller\x00', 0xfffffff7, 0xfd, &(0x7f0000000180)=""/253, 0x40f00, 0x39, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x4, 0x8003ff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = io_uring_setup(0x3467, &(0x7f0000000400)={0x0, 0xcc09, 0x0, 0x2, 0x354}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x0, {0x0, r2}, 0x3, 0x4, 0x0, {0x0, 0x0, r3}}) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1a00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x200040, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x400000, 0x0) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYBLOB="040026bd7000fbdbdf25060000000800090003000000"], 0x1c}, 0x1, 0x0, 0x0, 0xc5e2fbe10b9032d8}, 0x810) ioctl$SIOCGETSGCNT(r2, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) recvfrom$l2tp6(r2, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000700)=ANY=[@ANYBLOB="0288b100000000000000010000c008000000ad8d0000b2ac0000020000000000000003000080010000808000000000020000090000000000f36d"]) r4 = socket(0x25, 0x80000, 0x5) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r5, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="44160000", @ANYRES16=r5, @ANYBLOB="08002bbd7000ffdbdf250300000006000300ffff000014001f000000000000000000000000000000000005001400080000000c00160016e4000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x24008010}, 0x20048045) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x10000000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000040), 0x40, 0x48000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x7ff, 0x0, r0, 0x7fff, '\x00', 0x0, r0, 0x5, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x15, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x1, 0x1, 0x0, r6}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9f6, 0x16, &(0x7f0000000240)=""/22, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xa, 0x2d95, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r0, r7, r0, r0, r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xb, 0x7}, {0x2, 0x3, 0x10, 0x2}]}, 0x90) getsockname$l2tp6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000780)=0x20) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r10, 0x0, 0x0) recvfrom$l2tp6(r10, &(0x7f00000007c0)=""/209, 0xd1, 0x10000, &(0x7f00000008c0)={0xa, 0x0, 0x0, @empty}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000680), 0x0, 0x8}}, 0x20) r11 = socket(0x25, 0x80000, 0x5) r12 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r11, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r12, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x24, r12, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20004001) ioctl$KVM_SET_MP_STATE(r8, 0x4004ae99, &(0x7f0000000080)=0x7) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x4) 11:10:36 executing program 1: epoll_create(0x9f) 11:10:36 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x5, 0x1, 0x3, 0x2000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x40, 0x400, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x80, 0x1, 0xffffffff}}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) write$yama_ptrace_scope(r1, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x20, &(0x7f0000000500)=@raw=[@tail_call, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff90c}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}], &(0x7f0000000600)='syzkaller\x00', 0x1000, 0xe6, &(0x7f0000000640)=""/230, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x9, 0x63}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000007c0)=[r0, r0, r3], &(0x7f0000000800)=[{0x0, 0x3, 0x5, 0x2}, {0x5, 0x4, 0x5, 0x4}, {0x3, 0x1, 0xc, 0x6}, {0x3, 0x1, 0x7, 0xb}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x2, 0x0, 0x4}], 0x10, 0x4}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4b}, [@ldst={0x3, 0x1, 0x3, 0x2, 0x7, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x32, &(0x7f0000000080)=""/50, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x4, 0x0, 0x306, 0x58}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r4, r7, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x5, 0x5, 0xb, 0xb}], 0x10, 0xc653}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x5, 0x1, 0x3, 0x2000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x40, 0x400, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x80, 0x1, 0xffffffff}}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r6, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x20, &(0x7f0000000500)=@raw=[@tail_call, @map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff90c}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}], &(0x7f0000000600)='syzkaller\x00', 0x1000, 0xe6, &(0x7f0000000640)=""/230, 0x40f00, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x9, 0x63}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000007c0)=[r0, r0, r3], &(0x7f0000000800)=[{0x0, 0x3, 0x5, 0x2}, {0x5, 0x4, 0x5, 0x4}, {0x3, 0x1, 0xc, 0x6}, {0x3, 0x1, 0x7, 0xb}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x2, 0x0, 0x4}], 0x10, 0x4}, 0x90) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4b}, [@ldst={0x3, 0x1, 0x3, 0x2, 0x7, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x32, &(0x7f0000000080)=""/50, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x4, 0x0, 0x306, 0x58}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, r4, r7, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x5, 0x5, 0xb, 0xb}], 0x10, 0xc653}, 0x90) (async) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1b00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x200040, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x400000, 0x0) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYBLOB="040026bd7000fbdbdf25060000000800090003000000"], 0x1c}, 0x1, 0x0, 0x0, 0xc5e2fbe10b9032d8}, 0x810) (async) ioctl$SIOCGETSGCNT(r2, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) recvfrom$l2tp6(r2, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000700)=ANY=[@ANYBLOB="0288b100000000000000010000c008000000ad8d0000b2ac0000020000000000000003000080010000808000000000020000090000000000f36d"]) r4 = socket(0x25, 0x80000, 0x5) (async) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r5, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="44160000", @ANYRES16=r5, @ANYBLOB="08002bbd7000ffdbdf250300000006000300ffff000014001f000000000000000000000000000000000005001400080000000c00160016e4000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x24008010}, 0x20048045) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x10000000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000040), 0x40, 0x48000) (async) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x7ff, 0x0, r0, 0x7fff, '\x00', 0x0, r0, 0x5, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x15, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x1, 0x1, 0x0, r6}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9f6, 0x16, &(0x7f0000000240)=""/22, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xa, 0x2d95, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r0, r7, r0, r0, r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xb, 0x7}, {0x2, 0x3, 0x10, 0x2}]}, 0x90) getsockname$l2tp6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000780)=0x20) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r10, 0x0, 0x0) recvfrom$l2tp6(r10, &(0x7f00000007c0)=""/209, 0xd1, 0x10000, &(0x7f00000008c0)={0xa, 0x0, 0x0, @empty}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000680), 0x0, 0x8}}, 0x20) r11 = socket(0x25, 0x80000, 0x5) r12 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r11, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r12, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x24, r12, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20004001) (async) ioctl$KVM_SET_MP_STATE(r8, 0x4004ae99, &(0x7f0000000080)=0x7) 11:10:36 executing program 1: epoll_create(0x67) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080), 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x4) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0xffffffff, &(0x7f0000000040)=0x4) (async) 11:10:36 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1854000007000000000000000000003158b05a9e9d072f12a6ec6900186a00000a000000000000003f000000"], &(0x7f0000000140)='syzkaller\x00', 0xfffffff7, 0xfd, &(0x7f0000000180)=""/253, 0x40f00, 0x39, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x4, 0x8003ff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = io_uring_setup(0x3467, &(0x7f0000000400)={0x0, 0xcc09, 0x0, 0x2, 0x354}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x0, {0x0, r2}, 0x3, 0x4, 0x0, {0x0, 0x0, r3}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1854000007000000000000000000003158b05a9e9d072f12a6ec6900186a00000a000000000000003f000000"], &(0x7f0000000140)='syzkaller\x00', 0xfffffff7, 0xfd, &(0x7f0000000180)=""/253, 0x40f00, 0x39, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x4, 0x8003ff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000380)=r1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) io_uring_setup(0x3467, &(0x7f0000000400)={0x0, 0xcc09, 0x0, 0x2, 0x354}) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x0, {0x0, r2}, 0x3, 0x4, 0x0, {0x0, 0x0, r3}}) (async) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1c00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 1: epoll_create(0x67) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080), 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) epoll_create(0x67) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080), 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) (async) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) (async) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x200040, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0), 0x400000, 0x0) (async) socketpair(0xf, 0x5, 0xc42, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000cc0)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYBLOB="040026bd7000fbdbdf25060000000800090003000000"], 0x1c}, 0x1, 0x0, 0x0, 0xc5e2fbe10b9032d8}, 0x810) ioctl$SIOCGETSGCNT(r2, 0x89e1, &(0x7f0000000480)={@private=0xa010101, @multicast2}) recvfrom$l2tp6(r2, &(0x7f0000000940)=""/174, 0xae, 0x4, &(0x7f0000000a00)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000ac0), 0x8080, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000700)=ANY=[@ANYBLOB="0288b100000000000000010000c008000000ad8d0000b2ac0000020000000000000003000080010000808000000000020000090000000000f36d"]) (async) r4 = socket(0x25, 0x80000, 0x5) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), r3) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r5, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r2}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="44160000", @ANYRES16=r5, @ANYBLOB="08002bbd7000ffdbdf250300000006000300ffff000014001f000000000000000000000000000000000005001400080000000c00160016e4000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x24008010}, 0x20048045) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x10000000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000040), 0x40, 0x48000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffbff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x7ff, 0x0, r0, 0x7fff, '\x00', 0x0, r0, 0x5, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x15, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x1, 0x1, 0x0, r6}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9f6, 0x16, &(0x7f0000000240)=""/22, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xa, 0x2d95, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r0, r7, r0, r0, r0], &(0x7f00000003c0)=[{0x2, 0x3, 0xb, 0x7}, {0x2, 0x3, 0x10, 0x2}]}, 0x90) getsockname$l2tp6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000780)=0x20) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r10, 0x0, 0x0) recvfrom$l2tp6(r10, &(0x7f00000007c0)=""/209, 0xd1, 0x10000, &(0x7f00000008c0)={0xa, 0x0, 0x0, @empty}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000680), 0x0, 0x8}}, 0x20) r11 = socket(0x25, 0x80000, 0x5) r12 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000b80), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r11, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x24, r12, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x24, r12, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20004001) (async) ioctl$KVM_SET_MP_STATE(r8, 0x4004ae99, &(0x7f0000000080)=0x7) 11:10:36 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x75, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xffffff5f, 0x0, r2, 0xfffffff8, '\x00', 0x0, r0, 0x5, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0xe9, 0xf9, &(0x7f0000000100)=""/249, 0x40f00, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0x8, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000080)=[r3], &(0x7f0000000280)=[{0x4, 0x2, 0x7}], 0x10, 0x80000001}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000003c0)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0x3e, 0x0}, 0xffffffffffffffad) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r5, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000540)=r1}, 0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000005c0)=@raw=[@ldst={0xfb0fce05348d81e0, 0x2, 0x2, 0x7, 0x3, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3ff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x3a}], &(0x7f0000000640)='GPL\x00', 0xed97, 0xa3, &(0x7f0000000680)=""/163, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000740)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x7, 0x2, 0x415e}, 0x10, 0x2e4f5, r5, 0x2, &(0x7f0000000840)=[r9, r2, r10, r6, r1], &(0x7f0000000880)=[{0x3, 0x2, 0x1}, {0x4, 0x5, 0x10, 0x2}], 0x10, 0xfff}, 0x90) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000400)={0xfffffffffffffd91, 0x3}) 11:10:36 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="8470fdf319c90bef2db97e4c6f35cdab8eb910f600cb510304045848d0cd2eb3bcaa1ff467a0660bdd689e7111dcaa55f1045802cc0ae1a655fc267ae582fb73f879819f1a2587b3666b48cc0038a17aeea649045e9cc1e044b5279d0ee79d29d08b0d4ce325a33f5ba215730428623db567ed56b74e4f51dc1e816a8fd39beb5e372c1b275ab05ec6df6651351fe79efef57693260e5b219baf537258b8d90702b4dd805b04a2194676cd87bb100990", &(0x7f0000000180)=@udp6, 0x2}, 0x20) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = socket(0x6, 0x2, 0xcbca) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="a39378ed73c13a6eb9ab38c0f7dbff762f39b5848369bc5e9dc924e694d1ffe495fc9fb391d29eb00916cb006a1dc3ec80074681041508e6e124fa", &(0x7f0000000040)=@tcp=r0, 0x7}, 0x20) 11:10:36 executing program 1: epoll_create(0x67) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080), 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) 11:10:36 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="8470fdf319c90bef2db97e4c6f35cdab8eb910f600cb510304045848d0cd2eb3bcaa1ff467a0660bdd689e7111dcaa55f1045802cc0ae1a655fc267ae582fb73f879819f1a2587b3666b48cc0038a17aeea649045e9cc1e044b5279d0ee79d29d08b0d4ce325a33f5ba215730428623db567ed56b74e4f51dc1e816a8fd39beb5e372c1b275ab05ec6df6651351fe79efef57693260e5b219baf537258b8d90702b4dd805b04a2194676cd87bb100990", &(0x7f0000000180)=@udp6, 0x2}, 0x20) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r0 = socket(0x6, 0x2, 0xcbca) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="a39378ed73c13a6eb9ab38c0f7dbff762f39b5848369bc5e9dc924e694d1ffe495fc9fb391d29eb00916cb006a1dc3ec80074681041508e6e124fa", &(0x7f0000000040)=@tcp=r0, 0x7}, 0x20) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) 11:10:36 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1854000007000000000000000000003158b05a9e9d072f12a6ec6900186a00000a000000000000003f000000"], &(0x7f0000000140)='syzkaller\x00', 0xfffffff7, 0xfd, &(0x7f0000000180)=""/253, 0x40f00, 0x39, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xc, 0x4, 0x8003ff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) r3 = io_uring_setup(0x3467, &(0x7f0000000400)={0x0, 0xcc09, 0x0, 0x2, 0x354}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x0, {0x0, r2}, 0x3, 0x4, 0x0, {0x0, 0x0, r3}}) 11:10:36 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$yama_ptrace_scope(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x75, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xffffff5f, 0x0, r2, 0xfffffff8, '\x00', 0x0, r0, 0x5, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0xe9, 0xf9, &(0x7f0000000100)=""/249, 0x40f00, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0x8, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000080)=[r3], &(0x7f0000000280)=[{0x4, 0x2, 0x7}], 0x10, 0x80000001}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0xe9, 0xf9, &(0x7f0000000100)=""/249, 0x40f00, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0x8, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000080)=[r3], &(0x7f0000000280)=[{0x4, 0x2, 0x7}], 0x10, 0x80000001}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000003c0)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0x3e, 0x0}, 0xffffffffffffffad) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0x3e, 0x0}, 0xffffffffffffffad) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r5}, &(0x7f0000000980), &(0x7f00000009c0)=r5}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r5, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000540)=r1}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000005c0)=@raw=[@ldst={0xfb0fce05348d81e0, 0x2, 0x2, 0x7, 0x3, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3ff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x3a}], &(0x7f0000000640)='GPL\x00', 0xed97, 0xa3, &(0x7f0000000680)=""/163, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000740)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x7, 0x2, 0x415e}, 0x10, 0x2e4f5, r5, 0x2, &(0x7f0000000840)=[r9, r2, r10, r6, r1], &(0x7f0000000880)=[{0x3, 0x2, 0x1}, {0x4, 0x5, 0x10, 0x2}], 0x10, 0xfff}, 0x90) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000400)={0xfffffffffffffd91, 0x3}) (async) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000400)={0xfffffffffffffd91, 0x3}) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1d00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 1: epoll_create(0x6b) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x0, 0x0, '\x00', 0xa, 0x5}) epoll_create(0x6) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1e00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 0: msgget$private(0x0, 0x42) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xd95985a47a5a171b) 11:10:36 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x75, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x75, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0xffffff5f, 0x0, r2, 0xfffffff8, '\x00', 0x0, r0, 0x5, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0xe9, 0xf9, &(0x7f0000000100)=""/249, 0x40f00, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x1, 0x8, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000080)=[r3], &(0x7f0000000280)=[{0x4, 0x2, 0x7}], 0x10, 0x80000001}, 0x90) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000003c0)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r5, 0x0, 0x0) (async) write$yama_ptrace_scope(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r5, 0x3e, 0x0}, 0xffffffffffffffad) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r6, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r5}, &(0x7f0000000980), &(0x7f00000009c0)=r5}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{r5, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000540)=r1}, 0x20) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) (async) write$yama_ptrace_scope(r9, 0x0, 0x0) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000005c0)=@raw=[@ldst={0xfb0fce05348d81e0, 0x2, 0x2, 0x7, 0x3, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3ff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x3a}], &(0x7f0000000640)='GPL\x00', 0xed97, 0xa3, &(0x7f0000000680)=""/163, 0x40f00, 0x8, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000740)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x7, 0x2, 0x415e}, 0x10, 0x2e4f5, r5, 0x2, &(0x7f0000000840)=[r9, r2, r10, r6, r1], &(0x7f0000000880)=[{0x3, 0x2, 0x1}, {0x4, 0x5, 0x10, 0x2}], 0x10, 0xfff}, 0x90) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000400)={0xfffffffffffffd91, 0x3}) (async) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000400)={0xfffffffffffffd91, 0x3}) 11:10:36 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)="8470fdf319c90bef2db97e4c6f35cdab8eb910f600cb510304045848d0cd2eb3bcaa1ff467a0660bdd689e7111dcaa55f1045802cc0ae1a655fc267ae582fb73f879819f1a2587b3666b48cc0038a17aeea649045e9cc1e044b5279d0ee79d29d08b0d4ce325a33f5ba215730428623db567ed56b74e4f51dc1e816a8fd39beb5e372c1b275ab05ec6df6651351fe79efef57693260e5b219baf537258b8d90702b4dd805b04a2194676cd87bb100990", &(0x7f0000000180)=@udp6, 0x2}, 0x20) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async, rerun: 32) r0 = socket(0x6, 0x2, 0xcbca) (rerun: 32) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="a39378ed73c13a6eb9ab38c0f7dbff762f39b5848369bc5e9dc924e694d1ffe495fc9fb391d29eb00916cb006a1dc3ec80074681041508e6e124fa", &(0x7f0000000040)=@tcp=r0, 0x7}, 0x20) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) (rerun: 64) 11:10:36 executing program 1: epoll_create(0x6b) (async) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x0, 0x0, '\x00', 0xa, 0x5}) epoll_create(0x6) 11:10:36 executing program 0: msgget$private(0x0, 0x42) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xd95985a47a5a171b) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1f00, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:36 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 11:10:36 executing program 0: msgget$private(0x0, 0x42) (async) msgget$private(0x0, 0x42) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xd95985a47a5a171b) 11:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, 0x0, 0x0) 11:10:36 executing program 1: epoll_create(0x6b) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x0, 0x0, '\x00', 0xa, 0x5}) (async) epoll_create(0x6) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 11:10:36 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 11:10:36 executing program 1: epoll_create(0x67) epoll_create(0x8001) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x3, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x810) 11:10:36 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$rtc(&(0x7f00000000c0), 0x40, 0x80000) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) syz_open_dev$rtc(&(0x7f0000000080), 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000001c0)) socket$inet_sctp(0x2, 0x1, 0x84) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2100, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) 11:10:36 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 11:10:36 executing program 1: epoll_create(0x67) epoll_create(0x8001) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x3, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x810) epoll_create(0x67) (async) epoll_create(0x8001) (async) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x3, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x810) (async) 11:10:36 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$rtc(&(0x7f00000000c0), 0x40, 0x80000) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) (async) syz_open_dev$rtc(&(0x7f0000000080), 0x1, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async, rerun: 32) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000001c0)) (async, rerun: 32) socket$inet_sctp(0x2, 0x1, 0x84) 11:10:36 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xfffffffffffffedc, 0x0}, 0xc) 11:10:36 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2200, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:36 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async, rerun: 64) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) (rerun: 64) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (rerun: 32) 11:10:36 executing program 1: epoll_create(0x67) epoll_create(0x8001) (async) sendmsg$NFC_CMD_ACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd25, 0x3, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x810) 11:10:36 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 11:10:37 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xfffffffffffffedc, 0x0}, 0xc) (rerun: 64) 11:10:37 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r0 = syz_open_dev$rtc(&(0x7f00000000c0), 0x40, 0x80000) (rerun: 64) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x18) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) syz_open_dev$rtc(&(0x7f0000000080), 0x1, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000001c0)) (async, rerun: 32) socket$inet_sctp(0x2, 0x1, 0x84) (rerun: 32) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2300, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) (async) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x2}, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 11:10:37 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0xfffffffffffffedc, 0x0}, 0xc) (rerun: 32) 11:10:37 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x8daae8fe4540a698) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x60540, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x7, 0x1, 0x9, 0x81fcadd67419386c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x20, 0x10, 0x7fffffff, 0x4d}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x14, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x1, 0x1, 0x20, 0x10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xb}, @ldst={0x2, 0x3, 0x1, 0x8, 0x9, 0x2, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0xd, 0x6, 0x1, 0x30, 0xfffffffffffffff0}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x18, &(0x7f0000000140)=""/24, 0x41000, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xb, 0x1, 0x8}, 0x10, 0xc6a4, r3, 0x1, 0x0, &(0x7f00000002c0)=[{0x3, 0x2, 0xc, 0x4}], 0x10, 0x9}, 0x90) 11:10:37 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x6, 0xff, 0x2, 0x300e, r0, 0x1, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x2d, 0x2, 0x38, 0xffffffff, 0x4d, @ipv4={'\x00', '\xff\xff', @multicast2}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x10, 0x700, 0x80000001, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000200)={'tunl0\x00', r2, 0x8, 0x7808, 0x1000, 0x8, {{0x32, 0x4, 0x3, 0x8, 0xc8, 0x64, 0x0, 0x6, 0x29, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x54, 0x9f, 0x1, 0x8, [{@local, 0x6}, {@rand_addr=0x64010102, 0x7}, {@empty, 0x5}, {@private=0xa010102, 0x40}, {@remote, 0xd2c07b9}, {@local}, {@multicast2, 0x3}, {@empty, 0x5}, {@rand_addr=0x64010102, 0x4de}, {@private=0xa010102, 0x68bff869}]}, @end, @timestamp_addr={0x44, 0x34, 0x83, 0x1, 0x8, [{@local, 0x400}, {@loopback, 0x9e5}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x5}, {@empty, 0x2bc645e3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@loopback, 0x30f}]}, @lsrr={0x83, 0x27, 0x1c, [@loopback, @rand_addr=0x64010102, @multicast1, @empty, @private=0xa010100, @empty, @broadcast, @loopback, @private=0xa010101]}, @end]}}}}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0], &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x1, 0x0, 0x7, 0x2}) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x1000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000040)) 11:10:37 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x8daae8fe4540a698) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x60540, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x7, 0x1, 0x9, 0x81fcadd67419386c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x20, 0x10, 0x7fffffff, 0x4d}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x14, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x1, 0x1, 0x20, 0x10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xb}, @ldst={0x2, 0x3, 0x1, 0x8, 0x9, 0x2, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0xd, 0x6, 0x1, 0x30, 0xfffffffffffffff0}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x18, &(0x7f0000000140)=""/24, 0x41000, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xb, 0x1, 0x8}, 0x10, 0xc6a4, r3, 0x1, 0x0, &(0x7f00000002c0)=[{0x3, 0x2, 0xc, 0x4}], 0x10, 0x9}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x8daae8fe4540a698) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x60540, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x7, 0x1, 0x9, 0x81fcadd67419386c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x20, 0x10, 0x7fffffff, 0x4d}}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x14, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x1, 0x1, 0x20, 0x10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xb}, @ldst={0x2, 0x3, 0x1, 0x8, 0x9, 0x2, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0xd, 0x6, 0x1, 0x30, 0xfffffffffffffff0}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x18, &(0x7f0000000140)=""/24, 0x41000, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xb, 0x1, 0x8}, 0x10, 0xc6a4, r3, 0x1, 0x0, &(0x7f00000002c0)=[{0x3, 0x2, 0xc, 0x4}], 0x10, 0x9}, 0x90) (async) 11:10:37 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @bcast]}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x29, 0x5, 0x1, 0xfd0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x20, 0x8, 0x5}}) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x2000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c640, 0x0) 11:10:37 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000040)) (async) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000040)) 11:10:37 executing program 1: epoll_create(0x67) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x6, 0xff, 0x2, 0x300e, r0, 0x1, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x2d, 0x2, 0x38, 0xffffffff, 0x4d, @ipv4={'\x00', '\xff\xff', @multicast2}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x10, 0x700, 0x80000001, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000200)={'tunl0\x00', r2, 0x8, 0x7808, 0x1000, 0x8, {{0x32, 0x4, 0x3, 0x8, 0xc8, 0x64, 0x0, 0x6, 0x29, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x54, 0x9f, 0x1, 0x8, [{@local, 0x6}, {@rand_addr=0x64010102, 0x7}, {@empty, 0x5}, {@private=0xa010102, 0x40}, {@remote, 0xd2c07b9}, {@local}, {@multicast2, 0x3}, {@empty, 0x5}, {@rand_addr=0x64010102, 0x4de}, {@private=0xa010102, 0x68bff869}]}, @end, @timestamp_addr={0x44, 0x34, 0x83, 0x1, 0x8, [{@local, 0x400}, {@loopback, 0x9e5}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x5}, {@empty, 0x2bc645e3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@loopback, 0x30f}]}, @lsrr={0x83, 0x27, 0x1c, [@loopback, @rand_addr=0x64010102, @multicast1, @empty, @private=0xa010100, @empty, @broadcast, @loopback, @private=0xa010101]}, @end]}}}}}) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0], &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x1, 0x0, 0x7, 0x2}) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x3000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bind$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @bcast]}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x29, 0x5, 0x1, 0xfd0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x20, 0x8, 0x5}}) 11:10:37 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x8daae8fe4540a698) (async, rerun: 32) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x60540, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x7, 0x1, 0x9, 0x81fcadd67419386c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x20, 0x10, 0x7fffffff, 0x4d}}) (async, rerun: 32) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x14, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x1, 0x1, 0x20, 0x10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xb}, @ldst={0x2, 0x3, 0x1, 0x8, 0x9, 0x2, 0xfffffffffffffff0}, @alu={0x7, 0x1, 0xd, 0x6, 0x1, 0x30, 0xfffffffffffffff0}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit]}, &(0x7f0000000100)='GPL\x00', 0x1, 0x18, &(0x7f0000000140)=""/24, 0x41000, 0x4, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xb, 0x1, 0x8}, 0x10, 0xc6a4, r3, 0x1, 0x0, &(0x7f00000002c0)=[{0x3, 0x2, 0xc, 0x4}], 0x10, 0x9}, 0x90) 11:10:37 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c640, 0x0) 11:10:37 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async, rerun: 32) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000040)) (rerun: 32) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x4000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x6, 0xff, 0x2, 0x300e, r0, 0x1, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x2d, 0x2, 0x38, 0xffffffff, 0x4d, @ipv4={'\x00', '\xff\xff', @multicast2}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x10, 0x700, 0x80000001, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000200)={'tunl0\x00', r2, 0x8, 0x7808, 0x1000, 0x8, {{0x32, 0x4, 0x3, 0x8, 0xc8, 0x64, 0x0, 0x6, 0x29, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x54, 0x9f, 0x1, 0x8, [{@local, 0x6}, {@rand_addr=0x64010102, 0x7}, {@empty, 0x5}, {@private=0xa010102, 0x40}, {@remote, 0xd2c07b9}, {@local}, {@multicast2, 0x3}, {@empty, 0x5}, {@rand_addr=0x64010102, 0x4de}, {@private=0xa010102, 0x68bff869}]}, @end, @timestamp_addr={0x44, 0x34, 0x83, 0x1, 0x8, [{@local, 0x400}, {@loopback, 0x9e5}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x5}, {@empty, 0x2bc645e3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@loopback, 0x30f}]}, @lsrr={0x83, 0x27, 0x1c, [@loopback, @rand_addr=0x64010102, @multicast1, @empty, @private=0xa010100, @empty, @broadcast, @loopback, @private=0xa010101]}, @end]}}}}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0], &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x1, 0x0, 0x7, 0x2}) epoll_create(0x67) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vxcan0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x6, 0xff, 0x2, 0x300e, r0, 0x1, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x2d, 0x2, 0x38, 0xffffffff, 0x4d, @ipv4={'\x00', '\xff\xff', @multicast2}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x10, 0x700, 0x80000001, 0x8}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000200)={'tunl0\x00', r2, 0x8, 0x7808, 0x1000, 0x8, {{0x32, 0x4, 0x3, 0x8, 0xc8, 0x64, 0x0, 0x6, 0x29, 0x0, @empty, @multicast1, {[@timestamp_addr={0x44, 0x54, 0x9f, 0x1, 0x8, [{@local, 0x6}, {@rand_addr=0x64010102, 0x7}, {@empty, 0x5}, {@private=0xa010102, 0x40}, {@remote, 0xd2c07b9}, {@local}, {@multicast2, 0x3}, {@empty, 0x5}, {@rand_addr=0x64010102, 0x4de}, {@private=0xa010102, 0x68bff869}]}, @end, @timestamp_addr={0x44, 0x34, 0x83, 0x1, 0x8, [{@local, 0x400}, {@loopback, 0x9e5}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x5}, {@empty, 0x2bc645e3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@loopback, 0x30f}]}, @lsrr={0x83, 0x27, 0x1c, [@loopback, @rand_addr=0x64010102, @multicast1, @empty, @private=0xa010100, @empty, @broadcast, @loopback, @private=0xa010101]}, @end]}}}}}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0], &(0x7f0000000040), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x1, 0x0, 0x7, 0x2}) (async) 11:10:37 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) bind$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @bcast]}, 0x48) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x29, 0x5, 0x1, 0xfd0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x20, 0x8, 0x5}}) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x5000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x10c640, 0x0) 11:10:37 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x3, 0x44, @loopback, @mcast2, 0x80, 0x7, 0x400000, 0x800}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xf2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x851}, 0x4850) 11:10:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000050100000000000080ffffff1860000009000000000000002f0b000018170000", @ANYRES32, @ANYBLOB="000000000000000085100000fcffffff1507400001000000186800000600000000000000070000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x82, &(0x7f0000000100)=""/130, 0x1e00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x1, 0x7}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000240)=[{0x2, 0x3, 0xb, 0xa}, {0x4, 0x4, 0x4, 0x2}, {0x5, 0x1, 0x1, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x3, 0x2, 0x2, 0x6}, {0x3, 0x1, 0x3, 0x3}, {0x4, 0x4, 0xe, 0xc}, {0x3, 0x2, 0xa, 0x1}, {0x2, 0x2, 0x9, 0x2}, {0x5, 0x1, 0x10, 0xc}], 0x10, 0x6}, 0x90) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket(0x1f, 0xa, 0xfffffffa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x0, 0x9, 0x2, @empty, @mcast2, 0x20, 0x40, 0x8, 0x1}}) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x21, 0xe, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x80000001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x3, 0x3, 0x4, 0x9, 0x0, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0xb3}]}, &(0x7f00000003c0)='GPL\x00', 0x9, 0xe8, &(0x7f00000004c0)=""/232, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x2, 0xc, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600)=[r0, 0xffffffffffffffff], &(0x7f0000000640)=[{0x3, 0x3, 0x7, 0x9}, {0x1, 0x1, 0xb, 0x7}, {0x5, 0x2, 0x4, 0xb}], 0x10, 0x2}, 0x90) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000840), 0x3, 0x400181) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000800)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0x0, 0x0}, 0xffffffffffffff59) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 11:10:37 executing program 1: epoll_create(0x800065) 11:10:37 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x3, 0x44, @loopback, @mcast2, 0x80, 0x7, 0x400000, 0x800}}) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xf2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x851}, 0x4850) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x6000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 3: r0 = msgget$private(0x0, 0x508) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/219) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r1 = msgget$private(0x0, 0x142) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000100)=""/33) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x7000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x3, 0x44, @loopback, @mcast2, 0x80, 0x7, 0x400000, 0x800}}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) (async) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xf2}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x851}, 0x4850) 11:10:37 executing program 1: epoll_create(0x800065) 11:10:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0xb, 0x5, 0x3f, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000001c0)=0xffffffff, &(0x7f0000000200)=0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@RTM_DELMDB={0x98, 0x55, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x0, {@ip4=@multicast1, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x1, 0x4, {@in6_addr=@ipv4={'\x00', '\xff\xff', @local}, 0x9edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x3, {@in6_addr=@loopback}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x1, {@in6_addr=@local, 0x18b67}}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40080}, 0x8014) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000240)=0x6, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x40, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000300)=0x0, &(0x7f0000000340)=0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0xffffffff, 0x0, r4, 0xffffff01, '\x00', r5, r3, 0x4, 0x3, 0x3}, 0x48) 11:10:37 executing program 3: r0 = msgget$private(0x0, 0x508) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/219) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) r1 = msgget$private(0x0, 0x142) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000100)=""/33) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x8000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000050100000000000080ffffff1860000009000000000000002f0b000018170000", @ANYRES32, @ANYBLOB="000000000000000085100000fcffffff1507400001000000186800000600000000000000070000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x82, &(0x7f0000000100)=""/130, 0x1e00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x1, 0x7}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000240)=[{0x2, 0x3, 0xb, 0xa}, {0x4, 0x4, 0x4, 0x2}, {0x5, 0x1, 0x1, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x3, 0x2, 0x2, 0x6}, {0x3, 0x1, 0x3, 0x3}, {0x4, 0x4, 0xe, 0xc}, {0x3, 0x2, 0xa, 0x1}, {0x2, 0x2, 0x9, 0x2}, {0x5, 0x1, 0x10, 0xc}], 0x10, 0x6}, 0x90) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket(0x1f, 0xa, 0xfffffffa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x0, 0x9, 0x2, @empty, @mcast2, 0x20, 0x40, 0x8, 0x1}}) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x21, 0xe, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x80000001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x3, 0x3, 0x4, 0x9, 0x0, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0xb3}]}, &(0x7f00000003c0)='GPL\x00', 0x9, 0xe8, &(0x7f00000004c0)=""/232, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x2, 0xc, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600)=[r0, 0xffffffffffffffff], &(0x7f0000000640)=[{0x3, 0x3, 0x7, 0x9}, {0x1, 0x1, 0xb, 0x7}, {0x5, 0x2, 0x4, 0xb}], 0x10, 0x2}, 0x90) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000840), 0x3, 0x400181) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000800)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0x0, 0x0}, 0xffffffffffffff59) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000050100000000000080ffffff1860000009000000000000002f0b000018170000", @ANYRES32, @ANYBLOB="000000000000000085100000fcffffff1507400001000000186800000600000000000000070000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x82, &(0x7f0000000100)=""/130, 0x1e00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x1, 0x7}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000240)=[{0x2, 0x3, 0xb, 0xa}, {0x4, 0x4, 0x4, 0x2}, {0x5, 0x1, 0x1, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x3, 0x2, 0x2, 0x6}, {0x3, 0x1, 0x3, 0x3}, {0x4, 0x4, 0xe, 0xc}, {0x3, 0x2, 0xa, 0x1}, {0x2, 0x2, 0x9, 0x2}, {0x5, 0x1, 0x10, 0xc}], 0x10, 0x6}, 0x90) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) socket(0x1f, 0xa, 0xfffffffa) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x0, 0x9, 0x2, @empty, @mcast2, 0x20, 0x40, 0x8, 0x1}}) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x21, 0xe, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x80000001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x3, 0x3, 0x4, 0x9, 0x0, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0xb3}]}, &(0x7f00000003c0)='GPL\x00', 0x9, 0xe8, &(0x7f00000004c0)=""/232, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x2, 0xc, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600)=[r0, 0xffffffffffffffff], &(0x7f0000000640)=[{0x3, 0x3, 0x7, 0x9}, {0x1, 0x1, 0xb, 0x7}, {0x5, 0x2, 0x4, 0xb}], 0x10, 0x2}, 0x90) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000840), 0x3, 0x400181) (async) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000800)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0x0, 0x0}, 0xffffffffffffff59) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) 11:10:37 executing program 0: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) (async) socketpair(0xb, 0x5, 0x3f, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000001c0)=0xffffffff, &(0x7f0000000200)=0x4) (async) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@RTM_DELMDB={0x98, 0x55, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x0, {@ip4=@multicast1, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x1, 0x4, {@in6_addr=@ipv4={'\x00', '\xff\xff', @local}, 0x9edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x3, {@in6_addr=@loopback}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x1, {@in6_addr=@local, 0x18b67}}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40080}, 0x8014) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000240)=0x6, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x40, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000300)=0x0, &(0x7f0000000340)=0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0xffffffff, 0x0, r4, 0xffffff01, '\x00', r5, r3, 0x4, 0x3, 0x3}, 0x48) 11:10:37 executing program 1: epoll_create(0x800065) epoll_create(0x800065) (async) 11:10:37 executing program 3: r0 = msgget$private(0x0, 0x508) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/219) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) r1 = msgget$private(0x0, 0x142) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000100)=""/33) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x9000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 0: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000050100000000000080ffffff1860000009000000000000002f0b000018170000", @ANYRES32, @ANYBLOB="000000000000000085100000fcffffff1507400001000000186800000600000000000000070000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x82, &(0x7f0000000100)=""/130, 0x1e00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x1, 0x7}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000240)=[{0x2, 0x3, 0xb, 0xa}, {0x4, 0x4, 0x4, 0x2}, {0x5, 0x1, 0x1, 0x8}, {0x2, 0x5, 0x9, 0xb}, {0x3, 0x2, 0x2, 0x6}, {0x3, 0x1, 0x3, 0x3}, {0x4, 0x4, 0xe, 0xc}, {0x3, 0x2, 0xa, 0x1}, {0x2, 0x2, 0x9, 0x2}, {0x5, 0x1, 0x10, 0xc}], 0x10, 0x6}, 0x90) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = socket(0x1f, 0xa, 0xfffffffa) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000007c0)={'ip6_vti0\x00', &(0x7f0000000740)={'ip6_vti0\x00', 0x0, 0x2f, 0x9, 0x0, 0x9, 0x2, @empty, @mcast2, 0x20, 0x40, 0x8, 0x1}}) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x21, 0xe, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x80000001}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x3, 0x3, 0x4, 0x9, 0x0, 0x6, 0x1}, @call={0x85, 0x0, 0x0, 0xb3}]}, &(0x7f00000003c0)='GPL\x00', 0x9, 0xe8, &(0x7f00000004c0)=""/232, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x2, 0xc, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600)=[r0, 0xffffffffffffffff], &(0x7f0000000640)=[{0x3, 0x3, 0x7, 0x9}, {0x1, 0x1, 0xb, 0x7}, {0x5, 0x2, 0x4, 0xb}], 0x10, 0x2}, 0x90) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r2, 0x0, 0x0) (async, rerun: 32) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$yama_ptrace_scope(r3, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000840), 0x3, 0x400181) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000800)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0x0, 0x0}, 0xffffffffffffff59) (async, rerun: 64) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 11:10:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0xb, 0x5, 0x3f, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000001c0)=0xffffffff, &(0x7f0000000200)=0x4) (async) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@RTM_DELMDB={0x98, 0x55, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x0, {@ip4=@multicast1, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x1, 0x4, {@in6_addr=@ipv4={'\x00', '\xff\xff', @local}, 0x9edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x3, {@in6_addr=@loopback}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x0, 0x1, {@in6_addr=@local, 0x18b67}}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40080}, 0x8014) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r3, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000240)=0x6, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x40, 0x0, r3, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r4, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000300)=0x0, &(0x7f0000000340)=0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0xffffffff, 0x0, r4, 0xffffff01, '\x00', r5, r3, 0x4, 0x3, 0x3}, 0x48) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xa000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) epoll_create(0x4a99) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r1}) 11:10:37 executing program 0: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 11:10:37 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:37 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xb000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:37 executing program 1: epoll_create(0x67) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) epoll_create(0x4a99) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r1}) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001040)={r0, &(0x7f0000000000)="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", &(0x7f0000001000)=@tcp=r1, 0x1}, 0x20) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101442, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000580)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001580), 0x400, 0x0) sendmsg$nl_route(r2, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)=@RTM_NEWMDB={0x58, 0x54, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x3, {@ip4=@local, 0xc00}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@mcast2, 0x800}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x84}, 0x84) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x11, &(0x7f0000001780)=ANY=[@ANYBLOB="33f34e3fee43e1d3bc70cf8f9a2fcbc87ce35983eec598c65a2105ded148b45be475e2f1416040dec8f3d8562b6d55cb5e9ac8a24422feda9027e041d4ca53906f54ad0c1c", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018330000040000000000000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xd5, &(0x7f0000000140)=""/213, 0x41100, 0x68, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x7, 0xf6, 0x9f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000440)=[r1, 0x1, r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001700)=[{0x4, 0x1, 0x9, 0x6}, {0x0, 0x5, 0xd, 0xc}, {0x1, 0x1, 0x9, 0xa}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x5, 0x8, 0x7}], 0x10, 0x8}, 0x90) 11:10:38 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x501201, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x20000800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:38 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xc000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:38 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101442, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000580)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001580), 0x400, 0x0) sendmsg$nl_route(r2, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)=@RTM_NEWMDB={0x58, 0x54, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x3, {@ip4=@local, 0xc00}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@mcast2, 0x800}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x84}, 0x84) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x11, &(0x7f0000001780)=ANY=[@ANYBLOB="33f34e3fee43e1d3bc70cf8f9a2fcbc87ce35983eec598c65a2105ded148b45be475e2f1416040dec8f3d8562b6d55cb5e9ac8a24422feda9027e041d4ca53906f54ad0c1c", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018330000040000000000000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xd5, &(0x7f0000000140)=""/213, 0x41100, 0x68, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x7, 0xf6, 0x9f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000440)=[r1, 0x1, r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001700)=[{0x4, 0x1, 0x9, 0x6}, {0x0, 0x5, 0xd, 0xc}, {0x1, 0x1, 0x9, 0xa}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x5, 0x8, 0x7}], 0x10, 0x8}, 0x90) 11:10:38 executing program 1: epoll_create(0x67) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) epoll_create(0x4a99) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r1}) epoll_create(0x67) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) epoll_create(0x4a99) (async) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0], &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000002c0)={r1}) (async) 11:10:38 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x501201, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x501201, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x20000800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async, rerun: 32) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001040)={r0, &(0x7f0000000000)="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", &(0x7f0000001000)=@tcp=r1, 0x1}, 0x20) (rerun: 32) 11:10:38 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101442, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) (async) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000580)) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001580), 0x400, 0x0) sendmsg$nl_route(r2, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)=@RTM_NEWMDB={0x58, 0x54, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x3, {@ip4=@local, 0xc00}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@mcast2, 0x800}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x84}, 0x84) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x11, &(0x7f0000001780)=ANY=[@ANYBLOB="33f34e3fee43e1d3bc70cf8f9a2fcbc87ce35983eec598c65a2105ded148b45be475e2f1416040dec8f3d8562b6d55cb5e9ac8a24422feda9027e041d4ca53906f54ad0c1c", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018330000040000000000000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x10000, 0xd5, &(0x7f0000000140)=""/213, 0x41100, 0x68, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x7, 0xf6, 0x9f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f0000000440)=[r1, 0x1, r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001700)=[{0x4, 0x1, 0x9, 0x6}, {0x0, 0x5, 0xd, 0xc}, {0x1, 0x1, 0x9, 0xa}, {0x0, 0x4, 0xc, 0x9}, {0x1, 0x5, 0x8, 0x7}], 0x10, 0x8}, 0x90) 11:10:38 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xd000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r1, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001040)={r0, &(0x7f0000000000)="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", &(0x7f0000001000)=@tcp=r1, 0x1}, 0x20) 11:10:38 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x501201, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x20000800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x501201, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x20000800) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) 11:10:38 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3d) 11:10:38 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x15, 0x800, 0x5, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="109628bd7000fbdbdf250600000005002200007f0000000c00100000800000b800000009020b000000000006001c006900000006001a004e2100000500060003e094e45c00070002000000080019007f0000010ddcdf4cd8ca07f328595616cedba552323e96f343b45c1b3cffa6190b9d97657521085141bff3e313dc4c0c43ecaea28ecd6867dd"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="01a4bbc6", @ANYRES16=r2, @ANYBLOB="a5e32e35658be926df250201010000001600010000800000000008000c0003000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 11:10:38 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xe000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:38 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r0, 0x7, '\x00', r1, r0, 0x2, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r2, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000740)}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001940)={0x1b, 0x0, 0x0, 0x5, 0x0, r2, 0x1ff, '\x00', r1, r0, 0x2, 0x1, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a40)={{r0, 0xffffffffffffffff}, &(0x7f00000019c0), &(0x7f0000001a00)='%pi6 \x00'}, 0x20) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x11, 0x1e, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x46}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x0, 0x5, 0x4, 0xb, 0xfffffffffffffff8, 0x10}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, @ringbuf_query, @map_val={0x18, 0xe, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000900)=""/4096, 0x41100, 0x5, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000001900)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)=[r0, r5, r6, r0, r7], 0x0, 0x10, 0x7}, 0x90) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500), 0x111400, 0x0) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r9, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x15, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xa3fc}, {}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='syzkaller\x00', 0x100, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000540)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r9], &(0x7f00000005c0), 0x10, 0x7fff}, 0x90) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000300), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0800}, 0x20040800) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x1, {0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, '\x00', 0x17}, 0x6ed}}}, 0x38) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="fb352bbd7000000080000200000008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="083a3105b7c1f3fc431f70ab2af52bc9c7e51b2d0348ed13ea7d4a8f9a47e6e4eeda4a181297ac2ae540ec9353", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x20048051}, 0x40895) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3d) 11:10:38 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x15, 0x800, 0x5, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="109628bd7000fbdbdf250600000005002200007f0000000c00100000800000b800000009020b000000000006001c006900000006001a004e2100000500060003e094e45c00070002000000080019007f0000010ddcdf4cd8ca07f328595616cedba552323e96f343b45c1b3cffa6190b9d97657521085141bff3e313dc4c0c43ecaea28ecd6867dd"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="01a4bbc6", @ANYRES16=r2, @ANYBLOB="a5e32e35658be926df250201010000001600010000800000000008000c0003000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) (async) socketpair(0x15, 0x800, 0x5, &(0x7f00000001c0)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="109628bd7000fbdbdf250600000005002200007f0000000c00100000800000b800000009020b000000000006001c006900000006001a004e2100000500060003e094e45c00070002000000080019007f0000010ddcdf4cd8ca07f328595616cedba552323e96f343b45c1b3cffa6190b9d97657521085141bff3e313dc4c0c43ecaea28ecd6867dd"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="01a4bbc6", @ANYRES16=r2, @ANYBLOB="a5e32e35658be926df250201010000001600010000800000000008000c0003000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) (async) 11:10:38 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000300), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0800}, 0x20040800) (async) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0800}, 0x20040800) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x1, {0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, '\x00', 0x17}, 0x6ed}}}, 0x38) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="fb352bbd7000000080000200000008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="083a3105b7c1f3fc431f70ab2af52bc9c7e51b2d0348ed13ea7d4a8f9a47e6e4eeda4a181297ac2ae540ec9353", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x20048051}, 0x40895) 11:10:38 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0xf000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 11:10:38 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3d) 11:10:38 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$yama_ptrace_scope(r0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 11:10:38 executing program 3: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) socketpair(0x15, 0x800, 0x5, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 32) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="109628bd7000fbdbdf250600000005002200007f0000000c00100000800000b800000009020b000000000006001c006900000006001a004e2100000500060003e094e45c00070002000000080019007f0000010ddcdf4cd8ca07f328595616cedba552323e96f343b45c1b3cffa6190b9d97657521085141bff3e313dc4c0c43ecaea28ecd6867dd"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="01a4bbc6", @ANYRES16=r2, @ANYBLOB="a5e32e35658be926df250201010000001600010000800000000008000c0003000000"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 11:10:38 executing program 5: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x0) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000300), 0xffffffffffffffff) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c0800}, 0x20040800) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x1, {0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, '\x00', 0x17}, 0x6ed}}}, 0x38) (async, rerun: 64) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="fb352bbd7000000080000200000008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="083a3105b7c1f3fc431f70ab2af52bc9c7e51b2d0348ed13ea7d4a8f9a47e6e4eeda4a181297ac2ae540ec9353", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x20048051}, 0x40895) (rerun: 64) 11:10:38 executing program 4: bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x10000000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) [ 1958.797040][T30210] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 1958.808810][T30210] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 1958.817341][T30210] CPU: 1 PID: 30210 Comm: syz-executor.2 Not tainted 6.7.0-rc6-next-20231222-syzkaller #0 [ 1958.828276][T30210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1958.838330][T30210] RIP: 0010:scatterwalk_copychunks+0x3e0/0x560 [ 1958.844573][T30210] Code: f0 48 c1 e8 03 80 3c 08 00 0f 85 81 01 00 00 49 8d 44 24 08 4d 89 26 48 bf 00 00 00 00 00 fc ff df 48 89 44 24 10 48 c1 e8 03 <0f> b6 04 38 84 c0 74 08 3c 03 0f 8e 47 01 00 00 48 8b 44 24 08 41 [ 1958.865773][T30210] RSP: 0018:ffffc9000349e5e0 EFLAGS: 00010202 [ 1958.872127][T30210] RAX: 0000000000000001 RBX: 0000000000000000 RCX: dffffc0000000000 [ 1958.880130][T30210] RDX: 0000000000040000 RSI: ffffffff8465df74 RDI: dffffc0000000000 [ 1958.888553][T30210] RBP: 0000000000001000 R08: 0000000000000005 R09: 0000000000000000 [ 1958.897240][T30210] R10: 0000000000000002 R11: 52258a7e5c6b8a7e R12: 0000000000000000 [ 1958.905225][T30210] R13: 0000000000000005 R14: ffffc9000349e678 R15: 0000000000001000 [ 1958.913221][T30210] FS: 00007f71875a46c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 1958.922175][T30210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1958.928761][T30210] CR2: 00007f7ec53fdf78 CR3: 000000005d363000 CR4: 00000000003506f0 [ 1958.936734][T30210] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1958.944876][T30210] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1958.952853][T30210] Call Trace: [ 1958.956144][T30210] [ 1958.959249][T30210] ? show_regs+0x8e/0xa0 [ 1958.963773][T30210] ? die_addr+0x4f/0xd0 [ 1958.967938][T30210] ? exc_general_protection+0x155/0x230 [ 1958.973500][T30210] ? asm_exc_general_protection+0x26/0x30 [ 1958.979317][T30210] ? sg_next+0x84/0xb0 [ 1958.983408][T30210] ? scatterwalk_copychunks+0x3e0/0x560 [ 1958.989300][T30210] scatterwalk_map_and_copy+0x151/0x1d0 [ 1958.994894][T30210] ? scatterwalk_copychunks+0x560/0x560 [ 1959.000465][T30210] ? lock_release+0x4c8/0x6a0 [ 1959.005232][T30210] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1959.011314][T30210] scomp_acomp_comp_decomp+0x3a3/0x780 [ 1959.016863][T30210] ? sg_init_one+0xb2/0x150 [ 1959.021386][T30210] zswap_store+0x98b/0x2430 [ 1959.025985][T30210] ? zswap_folio_swapin+0x5a0/0x5a0 [ 1959.031190][T30210] ? do_raw_spin_unlock+0x172/0x230 [ 1959.036411][T30210] ? __swap_count+0x1b0/0x1b0 [ 1959.041191][T30210] ? __mod_memcg_lruvec_state+0x254/0x4e0 [ 1959.046916][T30210] swap_writepage+0x8e/0x220 [ 1959.051609][T30210] shmem_writepage+0x76b/0x1050 [ 1959.056470][T30210] pageout+0x399/0x9e0 [ 1959.060542][T30210] ? try_to_inc_max_seq.constprop.0+0x2200/0x2200 [ 1959.066965][T30210] ? trace_set_migration_pte+0x1c0/0x1c0 [ 1959.073815][T30210] ? folio_get_anon_vma+0x6c0/0x6c0 [ 1959.079025][T30210] shrink_folio_list+0x2f47/0x3ea0 [ 1959.084226][T30210] ? isolate_folios+0x3fe0/0x3fe0 [ 1959.089446][T30210] ? walk_pud_range+0x18a0/0x18a0 [ 1959.094469][T30210] ? folio_flags+0x71/0x1f0 [ 1959.098987][T30210] evict_folios+0x6e6/0x1b90 [ 1959.103579][T30210] ? try_to_free_mem_cgroup_pages+0x31f/0x780 [ 1959.109742][T30210] ? shrink_folio_list+0x3ea0/0x3ea0 [ 1959.115140][T30210] ? ringbuf_map_alloc+0x294/0x790 [ 1959.120540][T30210] ? __sys_bpf+0xa32/0x4a00 [ 1959.125246][T30210] ? do_syscall_64+0x40/0x110 [ 1959.129973][T30210] ? entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1959.136070][T30210] ? mem_cgroup_get_nr_swap_pages+0x20/0x120 [ 1959.142106][T30210] try_to_shrink_lruvec+0x638/0xa10 [ 1959.147327][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.152148][T30210] ? evict_folios+0x1b90/0x1b90 [ 1959.157161][T30210] shrink_lruvec+0x314/0x29a0 [ 1959.161849][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.166639][T30210] ? xa_load+0x150/0x2c0 [ 1959.171318][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.176088][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.180883][T30210] ? lock_release+0x4c8/0x6a0 [ 1959.185577][T30210] ? do_shrink_slab+0xaac/0x1140 [ 1959.190533][T30210] ? reclaim_throttle+0x960/0x960 [ 1959.195560][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.200342][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.205375][T30210] ? lock_release+0x4c8/0x6a0 [ 1959.210072][T30210] ? shrink_slab+0x11dd/0x1310 [ 1959.214875][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.221049][T30210] ? shrink_slab+0x866/0x1310 [ 1959.225825][T30210] ? rcu_read_unlock+0x1c/0x60 [ 1959.230614][T30210] ? reacquire_held_locks+0x4c0/0x4c0 [ 1959.236041][T30210] ? reparent_shrinker_deferred+0x400/0x400 [ 1959.241958][T30210] ? css_next_child+0xcf/0x2d0 [ 1959.246826][T30210] ? preempt_count_sub+0x160/0x160 [ 1959.251944][T30210] ? mem_cgroup_iter+0x2a0/0x750 [ 1959.256975][T30210] ? vmpressure+0x6e/0x340 [ 1959.261406][T30210] shrink_node+0x81b/0x3740 [ 1959.265954][T30210] ? unwind_next_frame+0x51/0x2390 [ 1959.271154][T30210] ? lru_gen_release_memcg+0x3e0/0x3e0 [ 1959.276613][T30210] ? bpf_ksym_find+0x124/0x1b0 [ 1959.281555][T30210] ? write_profile+0x450/0x450 [ 1959.286325][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.291121][T30210] do_try_to_free_pages+0x36a/0x1930 [ 1959.296444][T30210] ? __node_reclaim+0xa00/0xa00 [ 1959.301302][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.306090][T30210] ? lock_acquire+0x477/0x530 [ 1959.310799][T30210] try_to_free_mem_cgroup_pages+0x31f/0x780 [ 1959.316733][T30210] ? mem_cgroup_shrink_node+0x690/0x690 [ 1959.322374][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.327277][T30210] ? trace_irq_enable.constprop.0+0xe0/0x110 [ 1959.333356][T30210] try_charge_memcg+0x3d1/0x1190 [ 1959.338400][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.343193][T30210] ? mem_cgroup_handle_over_high+0x570/0x570 [ 1959.349566][T30210] ? get_mem_cgroup_from_objcg+0xb5/0x2a0 [ 1959.355325][T30210] ? reacquire_held_locks+0x4c0/0x4c0 [ 1959.360719][T30210] __memcg_kmem_charge_page+0xdb/0x2a0 [ 1959.366368][T30210] __alloc_pages+0x263/0x2410 [ 1959.371228][T30210] ? warn_alloc+0x3a0/0x3a0 [ 1959.375763][T30210] ? ringbuf_map_alloc+0x231/0x790 [ 1959.381214][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.386012][T30210] ? trace_kmalloc+0x29/0xb0 [ 1959.390716][T30210] ? __kmalloc_node+0x244/0x480 [ 1959.395601][T30210] ? ringbuf_map_alloc+0x231/0x790 [ 1959.401214][T30210] ? __bpf_map_area_alloc+0xea/0x180 [ 1959.407555][T30210] ringbuf_map_alloc+0x294/0x790 [ 1959.412599][T30210] map_create+0x548/0x1b90 [ 1959.417018][T30210] ? __might_fault+0x13b/0x190 [ 1959.421799][T30210] ? reacquire_held_locks+0x4c0/0x4c0 [ 1959.427434][T30210] ? __futex_wake_mark+0xe0/0xe0 [ 1959.432372][T30210] ? bpf_obj_name_cpy+0x1a0/0x1a0 [ 1959.437444][T30210] ? preempt_count_sub+0x160/0x160 [ 1959.442644][T30210] ? __might_fault+0xe3/0x190 [ 1959.447344][T30210] ? bpf_lsm_bpf+0x9/0x10 [ 1959.452044][T30210] __sys_bpf+0xa32/0x4a00 [ 1959.456389][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.461692][T30210] ? bpf_perf_link_attach+0x540/0x540 [ 1959.467070][T30210] ? reacquire_held_locks+0x4c0/0x4c0 [ 1959.472443][T30210] ? __fget_files+0x251/0x400 [ 1959.477213][T30210] ? vfs_write+0x14c/0xdf0 [ 1959.481637][T30210] ? preempt_count_sub+0x160/0x160 [ 1959.486752][T30210] ? __might_fault+0xe3/0x190 [ 1959.491439][T30210] ? rcu_is_watching+0x12/0xb0 [ 1959.496392][T30210] ? folio_memcg_unlock+0x240/0x240 [ 1959.501594][T30210] ? ksys_write+0x1a7/0x250 [ 1959.506113][T30210] __x64_sys_bpf+0x78/0xc0 [ 1959.510657][T30210] ? syscall_enter_from_user_mode+0x7d/0x110 [ 1959.516654][T30210] do_syscall_64+0x40/0x110 [ 1959.521262][T30210] entry_SYSCALL_64_after_hwframe+0x62/0x6a [ 1959.527162][T30210] RIP: 0033:0x7f718687cce9 [ 1959.531681][T30210] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1959.552001][T30210] RSP: 002b:00007f71875a40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1959.560593][T30210] RAX: ffffffffffffffda RBX: 00007f718699bf80 RCX: 00007f718687cce9 [ 1959.568666][T30210] RDX: 0000000000000048 RSI: 00000000200006c0 RDI: 0000000000000000 [ 1959.576738][T30210] RBP: 00007f71868c947a R08: 0000000000000000 R09: 0000000000000000 [ 1959.585422][T30210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1959.593397][T30210] R13: 000000000000000b R14: 00007f718699bf80 R15: 00007ffd9c4cf9e8 [ 1959.601379][T30210] [ 1959.604768][T30210] Modules linked in: [ 1959.612149][T30210] ---[ end trace 0000000000000000 ]--- [ 1959.618381][T30210] RIP: 0010:scatterwalk_copychunks+0x3e0/0x560 [ 1959.624784][T30210] Code: f0 48 c1 e8 03 80 3c 08 00 0f 85 81 01 00 00 49 8d 44 24 08 4d 89 26 48 bf 00 00 00 00 00 fc ff df 48 89 44 24 10 48 c1 e8 03 <0f> b6 04 38 84 c0 74 08 3c 03 0f 8e 47 01 00 00 48 8b 44 24 08 41 [ 1959.644918][T30210] RSP: 0018:ffffc9000349e5e0 EFLAGS: 00010202 [ 1959.651274][T30210] RAX: 0000000000000001 RBX: 0000000000000000 RCX: dffffc0000000000 [ 1959.659426][T30210] RDX: 0000000000040000 RSI: ffffffff8465df74 RDI: dffffc0000000000 [ 1959.667540][T30210] RBP: 0000000000001000 R08: 0000000000000005 R09: 0000000000000000 [ 1959.676174][T30210] R10: 0000000000000002 R11: 52258a7e5c6b8a7e R12: 0000000000000000 [ 1959.684236][T30210] R13: 0000000000000005 R14: ffffc9000349e678 R15: 0000000000001000 [ 1959.692227][T30210] FS: 00007f71875a46c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 1959.701296][T30210] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1959.708118][T30210] CR2: 00007f7ec53fdf78 CR3: 000000005d363000 CR4: 00000000003506f0 [ 1959.717445][T30210] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1959.726436][T30210] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1959.734476][T30210] Kernel panic - not syncing: Fatal exception [ 1959.740911][T30210] Kernel Offset: disabled [ 1959.745308][T30210] Rebooting in 86400 seconds..