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") r1 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, 0x0) capget(&(0x7f0000001580)={0x20071026, r1}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) ptrace$peeksig(0x4209, r0, &(0x7f00000011c0)={0x10000, 0x0, 0x7}, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}, {}]) 06:13:03 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 5: capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 4: r0 = syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") r1 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, 0xffffffffffffffff, 0x0) capget(&(0x7f0000001580)={0x20071026, r1}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) ptrace$peeksig(0x4209, r0, &(0x7f00000011c0)={0x10000, 0x0, 0x7}, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}, {}]) 06:13:03 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 5: capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 4: syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") r0 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 5: capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x7ff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 4: syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") r0 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 5: capget(&(0x7f0000001580), &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 4: syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 5: capget(&(0x7f0000001580), &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:03 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:03 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 4: syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 5: capget(&(0x7f0000001580), &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:04 executing program 2: ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 4: syz_clone(0x40110200, &(0x7f0000000040)="27c343fe5e7e95d0bd98df8266694598336fb01ec63d4a508c4985aa5ee019e3ded2b3735d2c3e7de9380e7865c70a797d2aba1ca43a70cab7833f9a07995e4b46fd1470e79eb7c8dc195b2be9cf4ce24df78ed291cdd1b1970cfdaffb2273da204f1efb0d947ed5ab1a1633eb788b830fde8ca078eecee2248cbcd625a6877b887f65d8cac268765f4d010f201b0b3c6172ed0d7ca573252cd17a627dacb2ec6e5933e933793ac547210e39806e0ba04a01ded646f7f28918b6f0223e3ff8964d419daea78e95b6334cf4f7e1c5184590b0139840663ab329d8bd38ca0b624a331f4f94b436544d1adf", 0xea, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="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") capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 5: capget(&(0x7f0000001580)={0x20071026}, 0x0) 06:13:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:04 executing program 4: r0 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 5: capget(&(0x7f0000001580)={0x20071026}, 0x0) 06:13:04 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 2: ppoll(0x0, 0x0, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:04 executing program 2: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 5: capget(&(0x7f0000001580)={0x20071026}, 0x0) 06:13:04 executing program 4: r0 = syz_clone(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:04 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x0, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:04 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:04 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x0, 0x0, 0x3, 0x47, 0x1000100, 0x101}) 06:13:04 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 2: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:05 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x3, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 0: ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:05 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:05 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x1000100, 0x101}) 06:13:05 executing program 0: ppoll(0x0, 0x0, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:05 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x47, 0x1000100, 0x101}) 06:13:05 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:06 executing program 2: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:06 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:06 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x101}) 06:13:06 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x1000100, 0x101}) 06:13:06 executing program 0: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:06 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, 0x0, 0x2, 0x0) 06:13:06 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, 0x0, 0x2, 0x0) 06:13:06 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:06 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x101}) 06:13:06 executing program 5: capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)) 06:13:06 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:06 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, 0x0, 0x2, 0x0) 06:13:07 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(0x0, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:07 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:07 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)) 06:13:07 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000540)='io.pressure\x00', 0x2, 0x0) 06:13:07 executing program 2: ppoll(0x0, 0x0, &(0x7f0000000480)={0x0, 0x989680}, 0x0, 0x0) 06:13:07 executing program 0: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:07 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:07 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)) 06:13:07 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) ppoll(&(0x7f0000000440)=[{0xffffffffffffffff, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:07 executing program 2: ppoll(0x0, 0x0, &(0x7f0000000480)={0x0, 0x989680}, 0x0, 0x0) 06:13:07 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:07 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x7ff) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ppoll(&(0x7f0000000440)=[{r2, 0x6010}, {r0}], 0x2, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:07 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000380)={0x0, 0x2}) 06:13:07 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:08 executing program 0: ppoll(0x0, 0x0, 0x0, &(0x7f00000004c0)={[0x2]}, 0x8) 06:13:08 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:08 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d", 0x9f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:13:08 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:08 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000380)={0x0, 0x2}) 06:13:08 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:08 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x0, r0}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:08 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000380)={0x0, 0x2}) 06:13:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1a, 0x5, 0x71) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x113, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfffffffa}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x100000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x10004055) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') 06:13:08 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:08 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:08 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:09 executing program 0: ppoll(0x0, 0x0, &(0x7f0000000480)={0x0, 0x989680}, 0x0, 0x0) 06:13:09 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, 0x0) 06:13:09 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:09 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:09 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:09 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') 06:13:09 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026}, &(0x7f00000015c0)={0x8, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:09 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:09 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) 06:13:09 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:09 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:09 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) 06:13:09 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:09 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000040)) 06:13:09 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) [ 1485.373001] ieee802154 phy0 wpan0: encryption failed: -22 [ 1485.378668] ieee802154 phy1 wpan1: encryption failed: -22 06:13:10 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:10 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:10 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) 06:13:10 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) 06:13:10 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:10 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, 0x0) 06:13:10 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) 06:13:10 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:10 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:10 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:10 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:10 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0xfffffe42, 0x3, 0x47, 0x1000100, 0x101}) 06:13:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) socket(0x25, 0x80801, 0x3) 06:13:10 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:10 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:11 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:11 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) socket(0x25, 0x80801, 0x3) 06:13:11 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x3, 0x47, 0x1000100, 0x101}) 06:13:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:11 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:11 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:11 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x47, 0x1000100, 0x101}) 06:13:11 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) socket(0x25, 0x80801, 0x3) 06:13:11 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:11 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = socket(0x25, 0x80801, 0x3) accept$ax25(r1, 0x0, &(0x7f0000000180)) 06:13:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:11 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) userfaultfd(0x81801) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:11 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x47, 0x1000100, 0x101}) 06:13:11 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) socket(0x25, 0x80801, 0x3) 06:13:11 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:11 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = socket(0x25, 0x80801, 0x3) accept$ax25(r1, 0x0, &(0x7f0000000180)) 06:13:11 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:11 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:11 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) socket(0x25, 0x80801, 0x3) 06:13:11 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x1000100, 0x101}) 06:13:12 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r0 = socket(0x25, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:12 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:12 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:12 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:12 executing program 0: socket(0x25, 0x80801, 0x3) 06:13:12 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x101}) 06:13:12 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = socket(0x25, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:12 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:12 executing program 0: socket(0x0, 0x80801, 0x3) 06:13:12 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)) 06:13:12 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:12 executing program 3: r0 = socket(0x25, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:12 executing program 2: syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:12 executing program 0: socket(0x0, 0x80801, 0x3) 06:13:12 executing program 5: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:12 executing program 3: r0 = socket(0x0, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:12 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:12 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:13 executing program 0: socket(0x0, 0x80801, 0x3) 06:13:13 executing program 2: syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:13 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:13 executing program 3: r0 = socket(0x0, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:13 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:13 executing program 0: socket(0x25, 0x0, 0x3) 06:13:13 executing program 2: syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:13 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x1) 06:13:13 executing program 3: r0 = socket(0x0, 0x80801, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:13 executing program 0: socket(0x25, 0x0, 0x3) 06:13:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:13 executing program 2: syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:13 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:13 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 06:13:13 executing program 3: r0 = socket(0x25, 0x0, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:13 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:13 executing program 0: socket(0x25, 0x0, 0x3) 06:13:13 executing program 2: syz_clone(0x820000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:13 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:13 executing program 3: r0 = socket(0x25, 0x0, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:13 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:14 executing program 5: socket(0x25, 0x0, 0x3) 06:13:14 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:14 executing program 3: r0 = socket(0x25, 0x0, 0x3) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:14 executing program 2: syz_clone(0x820000, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:14 executing program 5: socket(0x25, 0x0, 0x3) 06:13:14 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:14 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:14 executing program 3: r0 = socket(0x25, 0x80801, 0x0) accept$ax25(r0, 0x0, &(0x7f0000000180)) 06:13:14 executing program 5: socket(0x25, 0x0, 0x3) 06:13:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) 06:13:14 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:14 executing program 3: socket(0x25, 0x80801, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:14 executing program 2: syz_clone(0x820000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:14 executing program 5: socket(0x0, 0x0, 0x3) 06:13:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 06:13:14 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:14 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:14 executing program 3: socket(0x25, 0x80801, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:14 executing program 5: socket(0x0, 0x0, 0x3) 06:13:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 06:13:14 executing program 2: syz_clone(0x820000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:14 executing program 4: syz_init_net_socket$ax25(0x3, 0x0, 0x0) 06:13:15 executing program 3: socket(0x25, 0x80801, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:15 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 5: socket(0x0, 0x0, 0x3) 06:13:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:15 executing program 3: r0 = socket(0x25, 0x80801, 0x0) accept$ax25(r0, 0x0, 0x0) 06:13:15 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 5: socket(0x25, 0x0, 0x0) 06:13:15 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:15 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 0: socket(0x25, 0x80801, 0x0) 06:13:15 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:15 executing program 0: socket(0x0, 0x80801, 0x0) 06:13:15 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 0: socket(0x0, 0x80801, 0x0) 06:13:16 executing program 1: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 0: socket(0x0, 0x80801, 0x0) 06:13:16 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:16 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:17 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:17 executing program 1: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:17 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:17 executing program 0: socket(0x25, 0x0, 0x0) 06:13:17 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:17 executing program 1: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:17 executing program 0: socket(0x25, 0x0, 0x0) 06:13:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:18 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:18 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:18 executing program 0: socket(0x25, 0x0, 0x0) 06:13:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:18 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:18 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:19 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:19 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:19 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:20 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:20 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:20 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:20 executing program 2: syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:20 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:21 executing program 3: syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:21 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:22 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:22 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:23 executing program 5: syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:23 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:23 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:23 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:23 executing program 5: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:23 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:24 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:24 executing program 5: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:24 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:24 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:25 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) 06:13:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:25 executing program 5: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 3: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:25 executing program 2: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 5: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:25 executing program 3: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:25 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:26 executing program 2: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:26 executing program 5: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:26 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:26 executing program 3: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:26 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:26 executing program 2: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:26 executing program 5: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:26 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:27 executing program 0: syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:27 executing program 3: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:27 executing program 5: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:27 executing program 2: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:27 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:27 executing program 0: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:28 executing program 2: write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r1 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) 06:13:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:28 executing program 4: syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:28 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:28 executing program 0: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:28 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:29 executing program 0: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:29 executing program 4: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:29 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:29 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:29 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:29 executing program 4: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:29 executing program 0: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:30 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:30 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:30 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:30 executing program 4: syz_clone(0x0, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:30 executing program 0: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:30 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:31 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:31 executing program 0: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") 06:13:31 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:31 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:31 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:31 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449", 0x22, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:31 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:31 executing program 0: syz_clone(0x15102000, 0x0, 0x0, 0x0, 0x0, 0x0) 06:13:32 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:32 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:32 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449", 0x22, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:32 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:32 executing program 4: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:33 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449", 0x22, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:33 executing program 4: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:33 executing program 5: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:33 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449", 0x22, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:33 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:33 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449", 0x22, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:34 executing program 4: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:34 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94d", 0x33, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:34 executing program 5: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94d", 0x33, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:35 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 0: syz_clone(0x15102000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:35 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000001580)={0x20071026, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x47, 0x1000100, 0x101}) 06:13:36 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 06:13:36 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x1) 06:13:36 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94d", 0x33, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:36 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94d", 0x33, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:36 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:36 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:36 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:36 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:37 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:37 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:37 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:37 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:37 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:37 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94d", 0x33, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:37 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:38 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x25, 0x80801, 0x3) accept$ax25(r2, 0x0, &(0x7f0000000180)) bind$packet(r1, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) 06:13:38 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:38 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:38 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r0, 0xc1007c01, &(0x7f0000000100)) 06:13:38 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r4 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:38 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:38 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:39 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:39 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:39 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:39 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = userfaultfd(0x81801) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f00000017c0)={{r1}, 0x0, 0xe, @unused=[0x4, 0x7fff, 0x2400, 0x4], @devid}) r2 = syz_clone(0x1210800, &(0x7f0000000040)="cbf7f209cdae623ace4be3", 0xb, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="5d0acc0083be450e829b1375c550ebc9183e59fc439e5291a1a317e659f1b17bb13256f37a9c8116c005100ad462cf2b18acaeb70610645e9c13a474bdee9a2d56fdc5f508a8df791ce8d9b0fd41cafc9919db640bff165daca5a15b52166114b5e29396d231e3170d196b2306c58fa791711554f3caa57fa43128f57a15f10de06fd8ac0d95d42404b1903c7405689353ade9d68fce54035c47923c4ea409784febfd8cd6d9731964a9be2696e115762a480ca2d06e5ab7f0bfaec4c64aef53e2c8b3626e5860cdd98e3198146162") openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/mnt\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x20}]}, 0x24}}, 0x4000) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000001380)={0x0, 0x8000000000000000, 0x1, [0x8, 0x7fffffffffffffff, 0xed, 0x4], [0x2, 0x5, 0x7fffffffffffffff, 0x9, 0x980, 0x6, 0x10000, 0x1, 0x1, 0x200, 0x7, 0x1000, 0x7fffffff, 0x1, 0x8, 0x6, 0x8001, 0xffff, 0x200, 0x65, 0x5, 0x7, 0x6, 0x7, 0x3, 0x9, 0x8, 0x8, 0x352, 0x3, 0x7, 0x7, 0x20000, 0x5, 0xfffffffffffffffa, 0x8001, 0x100, 0x7, 0x9, 0x91f, 0x3, 0x5, 0x9, 0xce5, 0x1, 0x8000, 0x0, 0x1, 0xfffffffffffffff9, 0x400, 0x100000000, 0x6, 0x5, 0x2, 0x1, 0x0, 0x7e, 0xaaeb, 0x100000001, 0x9, 0x6, 0xc2, 0x9, 0xbfb3, 0x7fffffff, 0x7, 0x9e8, 0xfffffffffffffffa, 0x0, 0x101, 0x5, 0x6, 0x341, 0xff, 0x7fff, 0x29, 0x8, 0x8, 0x40, 0x1000, 0x8, 0x2, 0x1ff, 0x7fffffff, 0x2, 0x8000000000000000, 0x4, 0x9, 0x9, 0x9, 0x0, 0x8, 0x5, 0x4eda, 0x3, 0xfffffffffffffffa, 0x5, 0x8, 0x3, 0x2, 0x1, 0x9, 0x6, 0xe861, 0xffff, 0x5, 0x80, 0x400, 0x8, 0x4, 0xed, 0x7, 0x3, 0x7, 0x6, 0x3, 0xf8f, 0x1000, 0x2, 0x0, 0xb49d]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, 0x0) 06:13:39 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:40 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32", 0x94, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:13:40 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:40 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:40 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:40 executing program 0: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:40 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:40 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:41 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:41 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:41 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:41 executing program 0: sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x49}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xa}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x5}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0xf7}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = socket(0x1a, 0x5, 0x71) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000004c659cf7eccf0b7c0ca103a559c88b5ca7fb5688555ca4849a2d2b8443320b94206763cd7ddc946993ba64f3cdd808883fb8f08ea4b4fa0616a454825eaac01b5508d1c4df65d104cb815c6b2575", @ANYRES16=r2, @ANYBLOB="10002abd7000fbdbdf251100000005002e000100000008000b00ff000000"], 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4001) write$P9_RMKNOD(r0, &(0x7f0000000300)={0x14, 0x13, 0x2, {0x10, 0x2, 0x2}}, 0x14) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000900)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/tty/drivers\x00', 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000008c0)={&(0x7f0000000380)={0xa, 0x4e24, 0x1, @private2}, 0x1c, &(0x7f0000000780)=[{&(0x7f00000003c0)="6de55ec39afad936d560a13d6994ac70a6999846f01bedde25a562ac538cf411427e5b4a8cfd60290e2048ca05f4c4f3702491506e9ec2175133d51c857f0370620b9c16510791689ec89e731252a3f74928bf9fe4c8a01786b3049dd659e18324118fe9f14f4ad13e9ed64313d01579ec04f31da3482c21c502e7b538a60f2a03498e384399a255abc7523da9a1437d38a12f489aa766f5", 0x98}, {&(0x7f0000000480)="8ced0e22b6e2061c73794642f6037580835f5937a987982f5adeed2543696311467717d3890fbc2e6cc059f3d8e1cbf659791b0173c3211859261c6598acfd4043efd08862524b5af5fa4f6aa276b82fef033869ab4b21aca33945fb2b2a958ba8ef8f399d376be4af104cbb78c913c7274f49b70587c8932ee3359eb2ec072047a6528844fe08e67e81eb5445a0d4af3631dc67cdbcc7ce41c88dc878450c817f0c1435a7a9502609feb4c2abab6c7409697ec7a21aaab6feea72b141f5d6cf81f5b8a4fbffa398a3a5b631661f00773b", 0xd1}, {&(0x7f0000000580)="f475154dcd7e1bb464c6f19bfefc320bb5737c09f34c60fd82f2833fbabed0af0cdef9a578dddf31e66d32229d87679f53b006923af557b37a4866f1086d70e0aacb36ef6477b07779fe8c90ce6442734bf6ed352647adf9a24f0a67b7a03fa330300a13b6c11cfe77730ef67a9cac2795942a85e6d703b0cf2b67623311c7d911a20b3ce99aaf4a71b91a0db14dadf8850053f370829f1600f7acf2f7ce64a45c02b3c9d47b23c2c8885b7aedbec1d62c08bf3a48d25e3f4315c378ee60c4e9a02c87b9", 0xc4}, {&(0x7f0000000680)="84059402fda98cf321badfee4c20be052b298849701a442fa0e238803f98d463724a4025f8fa0fde173588796e50f8c3a887a197133816a1284a9597ea88bf9395570c82adcbc71c9b0672d160dacade45c3850ebca0f2c0257bda04cc78910f774eb6c8a0c439c24111187b10f77f6f48d0ae0ba534ef2a5fe97c6fa67603966e392d4d03c8624ef405bb5a20e0b3c281b517d4d0a39f7abc5f4fea0ad96e73cfbea437c09f5eb069a679bf42564f6472a93fc64ca01ce02a5f37c473208d3df943b6fcf45042", 0xc7}, {&(0x7f0000000bc0)="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", 0x1000}], 0x5, &(0x7f0000000800)=[@dstopts_2292={{0xa0, 0x29, 0x4, {0x33, 0x10, '\x00', [@jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x58, {0x0, 0x14, 0x3, 0x81, [0x1, 0x8, 0x2, 0x9, 0x7f, 0x5, 0xff, 0x3, 0x4, 0x7f]}}, @ra={0x5, 0x2, 0x6}, @pad1, @calipso={0x7, 0x18, {0x3, 0x4, 0x5, 0x0, [0x1, 0x4]}}, @enc_lim={0x4, 0x1, 0x9}]}}}], 0xa0}, 0x20000000) 06:13:41 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:41 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:41 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:41 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:41 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c69694038029001944646", 0x7f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:13:42 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c69694038029001944646", 0x7f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:13:42 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:42 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:42 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:42 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:42 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:42 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:42 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r2, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:42 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:43 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad3557", 0x3e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:43 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:43 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad", 0x3c, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 06:13:43 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:43 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:43 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad3557", 0x3e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:43 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad3557", 0x3e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:44 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:44 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:44 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad3557", 0x3e, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:44 executing program 3: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:44 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:44 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:45 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) 06:13:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:45 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:45 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:45 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:45 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:45 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) 06:13:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:45 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:46 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) 06:13:46 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:46 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:46 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:46 executing program 0: accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) 06:13:46 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:46 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:47 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) 06:13:47 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:47 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:47 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:47 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:47 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:47 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:13:48 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:48 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:13:48 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:48 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:48 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:48 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:48 executing program 0: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:13:48 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:48 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:49 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:49 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723", 0x3f, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:50 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:50 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:51 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:51 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:51 executing program 0: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:51 executing program 5: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) 06:13:51 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r5 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) 06:13:51 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, 0x0) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, 0x0) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:52 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r5 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r0, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x7dd3}) 06:13:52 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159c") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:52 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, 0x0) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:52 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:52 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159c") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:52 executing program 0: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159c") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:52 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r5 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:53 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:53 executing program 4: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:54 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r5 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:54 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:55 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0, 0x20, 0x700, 0x4, 0xde5f, {{0x18, 0x4, 0x2, 0x1, 0x60, 0x64, 0x0, 0x6, 0x2f, 0x0, @remote, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x2c, 0x81, 0x1, 0x4, [{@multicast2, 0x8}, {@remote, 0x9}, {@loopback, 0xffff}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x5}]}, @rr={0x7, 0x1b, 0x2e, [@broadcast, @private=0xa010101, @private=0xa010101, @local, @multicast1, @broadcast]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x1, 0x8000, 0x10000, 0x7f, {{0x18, 0x4, 0x1, 0x7, 0x60, 0x64, 0x0, 0x1, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@timestamp_prespec={0x44, 0x34, 0x2a, 0x3, 0x2, [{@multicast1, 0x7}, {@loopback, 0x56b63709}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x10001}, {@empty, 0x2}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4}]}, @rr={0x7, 0x13, 0x6e, [@dev={0xac, 0x14, 0x14, 0x18}, @local, @empty, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r2 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad355723175aab98c2", 0x44, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d8c30ef93be71b14ea49e3d01644b4cf716c1c4c5151158236481b8f7093e") r3 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:13:55 executing program 2: syz_clone(0x15102000, 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e") syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") 06:13:55 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) r2 = syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0)="c7059bf6a73e8de134589c41013e707b9b6255f76a8ca36dd46e8da491f3c9a01449d6d5fb57928c2b17a254e96d005891c94df8089cfb96eb8116ad35572317", 0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)) r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) socket$inet6_udplite(0xa, 0x2, 0x88) 06:13:55 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = syz_clone(0x88044000, &(0x7f0000000140)="065700ecfd567ce7678d2318340602d60000000000000062d105aed2d132b02bb4604f11979231c49f242118a818b522f6f7873cbf515a296967430abf0b8e54ba6fe5e6c85e256b6214", 0x4a, &(0x7f0000000340), &(0x7f0000000100), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000040)={0x8, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000840)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x9, 0x4, 0x2, 0x3d, 0x24, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x6, 0x3}, @rr={0x7, 0x7, 0x18, [@loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_EEE_GET(r8, &(0x7f0000000bc0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000a00)={0x15c, r7, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x4008050}, 0x4) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000d80)={'syztnl0\x00', &(0x7f0000000d00)={'ip6_vti0\x00', r9, 0x29, 0x1, 0x60, 0x1, 0xa, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x0, 0x80, 0x2, 0x20}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x4, 0x0, 0x1000, 0x1, 0x1ff, '\x00', r9, 0xffffffffffffffff, 0x5, 0x3, 0x5, 0xd}, 0x48) 06:17:01 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:01 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) write$P9_RREAD(r0, &(0x7f0000001300)={0x8e, 0x75, 0x1, {0x83, "4dce1faa0206d608fa7b684b15bc02dbf7882615f1ae80f33e309d7fc1e0a2dc2dd7d401e64d11bdd3e11f1c4a096131777db4a86307c03f21a2b2facaed8595c2c3ac0dc4c499e53fbe0f27a3851ab4f6ee483342a211dd436835d9ac2bf132c8a23d92084f0369604dab8e91e658fe6c78afe12496443c10e3e947782ff03de5440d"}}, 0x8e) openat$procfs(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) 06:17:02 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) write$P9_RREAD(r0, &(0x7f0000001300)={0x8e, 0x75, 0x1, {0x83, "4dce1faa0206d608fa7b684b15bc02dbf7882615f1ae80f33e309d7fc1e0a2dc2dd7d401e64d11bdd3e11f1c4a096131777db4a86307c03f21a2b2facaed8595c2c3ac0dc4c499e53fbe0f27a3851ab4f6ee483342a211dd436835d9ac2bf132c8a23d92084f0369604dab8e91e658fe6c78afe12496443c10e3e947782ff03de5440d"}}, 0x8e) 06:17:02 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) write$P9_RREAD(r0, &(0x7f0000001300)={0x8e, 0x75, 0x1, {0x83, "4dce1faa0206d608fa7b684b15bc02dbf7882615f1ae80f33e309d7fc1e0a2dc2dd7d401e64d11bdd3e11f1c4a096131777db4a86307c03f21a2b2facaed8595c2c3ac0dc4c499e53fbe0f27a3851ab4f6ee483342a211dd436835d9ac2bf132c8a23d92084f0369604dab8e91e658fe6c78afe12496443c10e3e947782ff03de5440d"}}, 0x8e) 06:17:02 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e611241b10d") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) [ 1717.598894] Bluetooth: hci5: command 0x041b tx timeout 06:17:02 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:02 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:02 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:02 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x0, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:02 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000400)={r2, 0x0, "8a71b5d1ad781ecc2c9b88c20968134b4e7b47a25af5c84d70f6200c77bcd435b856c392473e8defe874d3e43a78a7c40bf3a35982cb34f186547d1af35dc6c3b51dd1ee0b7cf6d61307b54685be2853855e23828c25d747fa3bed2d578d505c43011ce28fba0eb7e3af03af2cb9a1e31696ac8e44763b5c84a564076397ade98b5c6dc244e6d78dd090fabdbda631a7cdfe1940615fdc867ba2110db10588dd0390e93db763027cb8f2ac8474c596acb9128451729ef11fd662674362fbe3b871f00a23d5767dc1edf41ec1c155d77c3ec669510dae0a8ee6025ce8f29915618c2f75fff00e9d108f4341cf24be8fc84a0e7af5b205a6a3165d4041ac67f1af", "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"}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3cdf}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x2b}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 06:17:02 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:02 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:02 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:02 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:02 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:02 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:02 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_dev$MSR(&(0x7f0000000080), 0x8000000000023, 0x0) 06:17:02 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:02 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:02 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:02 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:03 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000400)={r2, 0x0, "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", "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"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3cdf}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x2b}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 06:17:03 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:03 executing program 1: r0 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') r2 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_clone(0x810200, &(0x7f00000000c0)="e96d77", 0x3, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="f701bb01d12e653d6c95115447eabefa348c026f6d67ee") pwrite64(r2, &(0x7f0000000080)="0e3ad38bd67e06d25b4838af59", 0xd, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f00000001c0)={{r1}, {@val, @actul_num={@val=0x2b, 0x3, 0x6b}}}) 06:17:03 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e6112") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:03 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:03 executing program 3: openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:03 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:03 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:03 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:03 executing program 3: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:03 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e6112") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:03 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:03 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:03 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:03 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:03 executing program 3: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:03 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:03 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:03 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{r0}, 0x0, 0x10, @inherit={0x68, &(0x7f0000000040)={0x0, 0x20000330, 0x8, 0x800000f7, {0x6, 0xffffffffffffffc0, 0x6, 0x7f, 0xd74b}, [0x0, 0x4, 0x1, 0x1]}}, @devid}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:03 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:03 executing program 3: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e6112") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:04 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:04 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) 06:17:04 executing program 3: openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) 06:17:04 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000400)={r2, 0x0, "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", "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"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000001480)={&(0x7f0000001440)={0x24, r4, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x40051) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r4, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3cdf}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x2b}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 06:17:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) [ 1719.678580] Bluetooth: hci5: command 0x040f tx timeout 06:17:04 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:04 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:04 executing program 2: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:04 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e6112") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:04 executing program 2: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:04 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:04 executing program 2: openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) 06:17:04 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) 06:17:04 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:04 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:04 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001100)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:05 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r1 = socket(0x1d, 0xa, 0x20000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000b40)=0x3f) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000040)={{}, {@void, @actul_num={@void, 0x1ff, 0x50}}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r3, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000000140)={{0x10b, 0x20, 0x9, 0x273, 0x1d4, 0x6, 0x2d7, 0x4}, "5a947d88c9f1dbd45a0e7b9fd5eaf94bdab75a6c522ae31460c102381fed1c67f770d54a7ce8dbe8438a046dc611b0447b109f2ef4dcd338c8f7f085b02abcfe4b47ca39b54a7d3c34e71891c9e67f7b29ae696915eae1d80609e54e14adb9266afef283584fcdbb6348034d4a9b1b9bd051ef50e77d8bc5f4d759088a5d11438ae9097e1e3e3e1ef00a2ba09d923a55c24c824954572c11285d7663b7cb95c41930"}, 0xc2) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x6, 0x7, 0x82, 0x7f, 0x2, 0x6, 0x0, 0x119, 0x38, 0x35e, 0xffffffff, 0x3ff, 0x20, 0x1, 0x7, 0xfff, 0x8}, [{0x60000000, 0x7, 0x4, 0x6ca3a1cb, 0x3, 0xffffffff, 0x6, 0x80000000}, {0x6, 0x5, 0x3, 0x0, 0x100, 0x8, 0x9f, 0xb8c}], "d9f68d1e1dcddb015c56316f0cfc933665a0bc523eeb152449466adf9a4fc5d5dbca30424b39", ['\x00', '\x00', '\x00']}, 0x39e) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r4, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000080)={{r5, 0x0, 0x6166, 0xd2f, 0x3, 0x1, 0x8, 0x0, 0x7f, 0x10000, 0xb33, 0xffffffffffffffb4, 0xa, 0x5, 0x4}, 0x20, [0x0, 0x0, 0x0, 0x0]}) r6 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000a40)={{0x3, @default}, [@rose, @netrom, @rose, @default, @bcast, @null]}, &(0x7f0000000ac0)=0x48, 0x800) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000b00)={'batadv_slave_0\x00'}) write$P9_RSETATTR(r4, &(0x7f0000000240)={0x7, 0x1b, 0x2}, 0x7) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000280)) r7 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000bc0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_RM_DEV_V2(r7, 0x5000943a, &(0x7f0000000e40)={{r3}, r8, 0x10, @inherit={0x50, &(0x7f0000000dc0)={0x0, 0x1, 0x7, 0x800, {0x3b, 0x5, 0x6b43, 0x3, 0x5}, [0x80000000]}}, @name="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"}) sendmsg$inet6(r1, &(0x7f0000002200)={&(0x7f0000001e40)={0xa, 0x4e24, 0x800, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}, 0x1c, &(0x7f0000002000)=[{&(0x7f0000001e80)="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", 0xfe}, {&(0x7f0000001f80)="3a9140251cea52d9c15f91dcbd3c629f85a32705c4e2bd029fd7ce35498c0d21c653ce86ae2eb1414b52dcb49dd7f0f5aaa292b7a4722a87db57034d745e033b6918ab259997518fb77d42", 0x4b}], 0x2, &(0x7f0000002040)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x81}}, @hoplimit={{0x14, 0x29, 0x34, 0xca}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2f, 0x0, '\x00', [@jumbo]}}}, @dstopts={{0xc0, 0x29, 0x37, {0x32, 0x14, '\x00', [@hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @pad1, @generic={0x20, 0x31, "8f5472afec35da9d941954bf7ddd63b133de08c081b6ced734689f47fab16df72009f2a6b3252c26d798353cbc9403b35a"}, @hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x40, {0x1, 0xe, 0x8, 0x719b, [0x7, 0x100000001, 0xc3, 0x742b, 0x7, 0x4, 0x6]}}]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x5c, 0x1, '\x00', [@ra={0x5, 0x2, 0x3}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x3a, 0x6, 0x1, 0x8, 0x0, [@mcast2, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x10001}}, @dontfrag={{0x14, 0x29, 0x3e, 0xe4}}], 0x1b0}, 0x10) 06:17:05 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:05 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x10) 06:17:05 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a2") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:05 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:05 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x354d9c5c}}, 0x18) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x1}, 0x1f}}, 0x18) 06:17:05 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x354d9c5c}}, 0x18) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x1}, 0x1f}}, 0x18) 06:17:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:05 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:06 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x354d9c5c}}, 0x18) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x1}, 0x1f}}, 0x18) 06:17:06 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:06 executing program 1: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x2, 0xc0, 0xc233, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x9, 0x7f}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)=r1) r3 = socket(0x1a, 0x5, 0x71) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r3) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000000f7f786b798", @ANYRES16=r5, @ANYBLOB="00022dbd7000fbdbdf250800000005003700010000000a0009000000000000000000"], 0x28}}, 0x20004000) r6 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") socket(0x5, 0x4, 0x101) r7 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, r3, &(0x7f00000004c0)={0xffffffffffffffff, r7, 0x40}) r8 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r8, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r9, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r10, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r11 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0xfffffff8}, @ETHTOOL_A_RINGS_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r8) socket$inet6_udplite(0xa, 0x2, 0x88) 06:17:06 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x354d9c5c}}, 0x18) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x8, 0x1, 0x1}, 0x1f}}, 0x18) 06:17:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:06 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:06 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x2, 0xc0, 0xc233, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x9, 0x7f}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)=r1) r3 = socket(0x1a, 0x5, 0x71) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r3) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000000f7f786b798", @ANYRES16=r5, @ANYBLOB="00022dbd7000fbdbdf250800000005003700010000000a0009000000000000000000"], 0x28}}, 0x20004000) r6 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") socket(0x5, 0x4, 0x101) r7 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, r3, &(0x7f00000004c0)={0xffffffffffffffff, r7, 0x40}) r8 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r8, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r9, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r10, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r11 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0xfffffff8}, @ETHTOOL_A_RINGS_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r8) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1721.758466] Bluetooth: hci5: command 0x0419 tx timeout 06:17:06 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x354d9c5c}}, 0x18) 06:17:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x181080, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:06 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:06 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:06 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) 06:17:06 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 06:17:06 executing program 3: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x2, 0xc0, 0xc233, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x1, 0x9, 0x7f}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000280)=r1) r3 = socket(0x1a, 0x5, 0x71) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r3) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000000f7f786b798", @ANYRES16=r5, @ANYBLOB="00022dbd7000fbdbdf250800000005003700010000000a0009000000000000000000"], 0x28}}, 0x20004000) r6 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") socket(0x5, 0x4, 0x101) r7 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r6, 0x7, r3, &(0x7f00000004c0)={0xffffffffffffffff, r7, 0x40}) r8 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r8, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r9, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r10, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) r11 = socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f00000009c0)={'erspan0\x00', &(0x7f0000000940)={'sit0\x00', 0x0, 0x1, 0x8, 0x10000, 0x5, {{0x17, 0x4, 0x2, 0x3d, 0x5c, 0x66, 0x0, 0x1, 0x2b, 0x0, @rand_addr=0x64010101, @rand_addr=0x64010102, {[@cipso={0x86, 0x3e, 0x3, [{0x2, 0xe, "c83e7a35a6c8a0d52fbc22d2"}, {0x1, 0x3, '('}, {0x2, 0x5, '0x0}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0xfffffff8}, @ETHTOOL_A_RINGS_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), r8) socket$inet6_udplite(0xa, 0x2, 0x88) 06:17:06 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x111) 06:17:06 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:06 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:06 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:07 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x414c01, 0x111) 06:17:07 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:07 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:07 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:07 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x414c01, 0x111) 06:17:07 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:07 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:07 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:07 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) 06:17:07 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x414c01, 0x111) 06:17:07 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:07 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:08 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:08 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 06:17:08 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:08 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:08 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x414c01, 0x0) 06:17:08 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:08 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:08 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:08 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:08 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:09 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:09 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1f, 0x10) 06:17:09 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:09 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x111) 06:17:09 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @aes256, 0x0, @desc1}) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 06:17:09 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:09 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:09 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x0, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c717b4838776dff3f47b245b9bf9042d17caed4751870a23d7b9be6", 0x37, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:09 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) socket(0x1a, 0x5, 0x71) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r0, 0x1f, 0x10) 06:17:09 executing program 0: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x111) 06:17:09 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r6, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:09 executing program 0: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x111) 06:17:09 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) 06:17:10 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:10 executing program 0: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x111) 06:17:10 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r3, 0x1f, 0x10) 06:17:10 executing program 3: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x31ca528f6c43cddb}]}, 0x24}, 0x1, 0x0, 0x0, 0x44000080}, 0x800) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'erspan0\x00', &(0x7f0000000280)={'syztnl1\x00', r0, 0x700, 0x8, 0xfffffff8, 0x6, {{0x14, 0x4, 0x2, 0x8, 0x50, 0x64, 0x0, 0x7f, 0x2f, 0x0, @remote, @multicast1, {[@timestamp_prespec={0x44, 0x14, 0xae, 0x3, 0xe, [{@multicast1, 0x51c7}, {@local, 0xfffff001}]}, @cipso={0x86, 0x1c, 0xffffffffffffffff, [{0x2, 0x4, "9514"}, {0x2, 0x6, "2813b9d6"}, {0x7, 0xc, "1e276b08f1041a572b67"}]}, @generic={0x7, 0xa, "70ffa755400e8162"}]}}}}}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r5, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x34, r7, 0x0, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)={0x230, r7, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_OURS={0x1c4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',,+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0xb4, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x113}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%}'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff2d38}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '(.%],\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x4}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '.&\\&\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x5a, 0x4, "93e8f58f69b4e1a8d437d7a396d29ee977d25045c92e136bcf38aa53efcacb96e493575e8ab002a39a236ff933089b54f26c06cdb22625fba206559234535669fa37c492b711577e6997221f18f862ad5b964ace1df6"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x40}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x1f}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}]}, 0x230}, 0x1, 0x0, 0x0, 0x9630882e839f0e46}, 0x20000040) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80040012}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c008000", @ANYRES16=r4, @ANYBLOB="00012dbd7000ffdbdf250100000005002a0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008004) 06:17:10 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) 06:17:10 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing', 0x0, 0x0) 06:17:10 executing program 1: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x31ca528f6c43cddb}]}, 0x24}, 0x1, 0x0, 0x0, 0x44000080}, 0x800) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'erspan0\x00', &(0x7f0000000280)={'syztnl1\x00', r0, 0x700, 0x8, 0xfffffff8, 0x6, {{0x14, 0x4, 0x2, 0x8, 0x50, 0x64, 0x0, 0x7f, 0x2f, 0x0, @remote, @multicast1, {[@timestamp_prespec={0x44, 0x14, 0xae, 0x3, 0xe, [{@multicast1, 0x51c7}, {@local, 0xfffff001}]}, @cipso={0x86, 0x1c, 0xffffffffffffffff, [{0x2, 0x4, "9514"}, {0x2, 0x6, "2813b9d6"}, {0x7, 0xc, "1e276b08f1041a572b67"}]}, @generic={0x7, 0xa, "70ffa755400e8162"}]}}}}}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$P9_RREADLINK(r5, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x34, r7, 0x0, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)={0x230, r7, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x5}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_OURS={0x1c4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',,+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0xb4, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x113}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%}'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff2d38}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x4}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '(.%],\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x4}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '.&\\&\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x5a, 0x4, "93e8f58f69b4e1a8d437d7a396d29ee977d25045c92e136bcf38aa53efcacb96e493575e8ab002a39a236ff933089b54f26c06cdb22625fba206559234535669fa37c492b711577e6997221f18f862ad5b964ace1df6"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x40}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x1f}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}]}, 0x230}, 0x1, 0x0, 0x0, 0x9630882e839f0e46}, 0x20000040) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80040012}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c008000", @ANYRES16=r4, @ANYBLOB="00012dbd7000ffdbdf250100000005002a0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4040004}, 0x4008004) 06:17:10 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:10 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) 06:17:10 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r5, 0x1f, 0x10) 06:17:10 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) r5 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r5, 0x1f, 0x10) 06:17:10 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) socket$nl_generic(0x10, 0x3, 0x10) 06:17:10 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) 06:17:11 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480), 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:11 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) 06:17:11 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) 06:17:11 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) 06:17:11 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) socket$nl_generic(0x10, 0x3, 0x10) 06:17:11 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) r5 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r5, 0x1f, 0x10) 06:17:11 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480), 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:11 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 06:17:11 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) 06:17:12 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) 06:17:12 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r6) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x3c, r7, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xff}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1f}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x80846be9abf06283}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000850) socket(0xf, 0x2, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000840)) 06:17:12 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 06:17:12 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) socket$nl_generic(0x10, 0x3, 0x10) 06:17:12 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480), 0x0, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:12 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 06:17:12 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) r5 = syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) ptrace$setopts(0x4206, r5, 0x1f, 0x10) 06:17:12 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) 06:17:12 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) 06:17:13 executing program 3: r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x18000, &(0x7f0000000080)={[0xffffffffffffffff]}, 0x8) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) accept$phonet_pipe(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 06:17:13 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:13 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 06:17:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c", 0x1c, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:13 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) r5 = socket(0x1d, 0x80000, 0x200000) sendmsg$ETHTOOL_MSG_PAUSE_SET(r5, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x14) 06:17:13 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:13 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) 06:17:13 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) syz_clone(0x80040000, &(0x7f0000000280), 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) 06:17:13 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:13 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) 06:17:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7fd9632e26e3b405171afbb986010a50e9d93f9a9e52d794d2fe78c", 0x1c, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:13 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) socket(0x1a, 0x5, 0x71) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) 06:17:14 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:14 executing program 3: r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x18000, &(0x7f0000000080)={[0xffffffffffffffff]}, 0x8) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) accept$phonet_pipe(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 06:17:14 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) 06:17:14 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:14 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) 06:17:14 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:14 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) [ 1731.129185] ieee802154 phy0 wpan0: encryption failed: -22 [ 1731.134836] ieee802154 phy1 wpan1: encryption failed: -22 06:17:19 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) 06:17:19 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) socket(0x1d, 0x80000, 0x200000) 06:17:31 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) 06:17:35 executing program 3: r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x18000, &(0x7f0000000080)={[0xffffffffffffffff]}, 0x8) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) accept$phonet_pipe(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 06:17:35 executing program 2: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 06:17:35 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:35 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) r3 = syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") r4 = socket$l2tp(0x2, 0x2, 0x73) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, &(0x7f00000004c0)={0xffffffffffffffff, r4, 0x40}) 06:17:35 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7", 0x1, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:35 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") socket$l2tp(0x2, 0x2, 0x73) 06:17:36 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:36 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:36 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") 06:17:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") socket$l2tp(0x2, 0x2, 0x73) 06:17:36 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r1 = syz_clone(0x15102000, &(0x7f00000002c0), 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="9c506c1fdb1dcfd88807d210a0a84088159cd50a9e4d36f9033c5e204abc11da73694511ca9e6e9ca4c9b1abcef635fc256729e341dac45c0ae56e202a4803e0c277ede9f7cbecf124e9ff07f38316890f0586c9d73b591cb63b9a739239cf12742fbfe55936655b890c5ea8ac08eb1aec17e7811ff6200779c84509862b55aa4ba5116a30ba2f14043b177c04f24b2ff1274a6fb3463d58cb75a3a25e61") r2 = syz_clone(0x820000, &(0x7f0000000480)="e7", 0x1, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="c996c57094bbc9a6b8a4bcc10380062b845afc1dec89b2f2919fc5aa477064b61af5c19dc4b4541fa49a31a277d613eafe0c93389bfdba49b65665b9db4e9acd9568890101d06bde0ebe69f535c688894697aaf422ef73493c76ab046b963af0fb6bf291700d0c59befb35d8fb526e00291651d39996ac34999d55dac9844ff47b7370962d5d8faef6e28330d33fcd4ed5a7429c06532b25b632ffc2149002d158f0d0ab0dc271b37e4fb8ac49ef2cb96679c9a6b4354644b94308204ded0065ff7d74bec75ec3d516d56c80b942dde4da2cdebb33b322c0e058591ab5613b51b0c765c44f83") kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000640)={r0, r0, 0x7dd3}) 06:17:36 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:36 executing program 3: r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x18000, &(0x7f0000000080)={[0xffffffffffffffff]}, 0x8) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) accept$phonet_pipe(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 06:17:36 executing program 1: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") 06:17:36 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:36 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) 06:17:37 executing program 1: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 06:17:37 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 06:17:37 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) 06:17:37 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") 06:17:37 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') socket$packet(0x11, 0x3, 0x300) r0 = socket(0x1a, 0x5, 0x71) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x34}}, 0x4000000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x20004000) syz_clone(0x80040000, &(0x7f0000000280)="43215e820c0d0c3ee151e78982c01444f65cedf20f9fc7daa30a1c614ca2642328cafca0189978a55a57b6b0590a2285da9fad6e479dd23d4a97b3f05d5adfb722523540ad2db8d7123b7a8ad0c03367149f0fed8a72adcbe033390f933eb1bb7402a99294e271fb7615bcc2917b5161c0c6f9e92c6969403802900194464671687ef190bdb4176aa3865b41e10b1625e8cc7c32793edb584a10c153ce468d082ac130fc7460f27142", 0xa9, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="5f452ee40661921311e92eaf5b93af40e530b6bbb9183ef21118fec8c7ecc826f3baa7233853b7e0409982898135434e6dbf355e2b26aab6c5955ef2d29ed63724e984e1ff73d7947cc5181172685207cd990fa93da9bafe6bc5528c6cf3f186d5dc07381a7e652309515ee80010c906ee72a5db2aa355a001cce882f5dc02aeed945319ed59cebdf01183698c8f91a2b88eeadc3c173ef2cd374baf9b29adcd141667724cbbb1e16b890d131058ac63b49385acad3045bb3351c23a9502aff37589209e11c52cf781079aa596af31023ee5b8a65918f970ec") [ 1756.055281] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1756.062069] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1756.070649] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1756.077572] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1756.085011] device bridge_slave_1 left promiscuous mode [ 1756.091009] bridge0: port 2(bridge_slave_1) entered disabled state [ 1756.098337] device bridge_slave_0 left promiscuous mode [ 1756.103772] bridge0: port 1(bridge_slave_0) entered disabled state [ 1756.113000] device veth1_macvtap left promiscuous mode [ 1756.118404] device veth0_macvtap left promiscuous mode [ 1756.123703] device veth1_vlan left promiscuous mode [ 1756.128849] device veth0_vlan left promiscuous mode [ 1760.194871] device hsr_slave_1 left promiscuous mode [ 1760.202282] device hsr_slave_0 left promiscuous mode [ 1760.215594] team0 (unregistering): Port device team_slave_1 removed [ 1760.225039] team0 (unregistering): Port device team_slave_0 removed [ 1760.237714] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1760.247973] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1760.274930] bond0 (unregistering): Released all slaves [ 1769.035900] Bluetooth: hci4: command 0x0406 tx timeout [ 1792.555836] ieee802154 phy0 wpan0: encryption failed: -22 [ 1792.561440] ieee802154 phy1 wpan1: encryption failed: -22 [ 1798.314714] INFO: task syz-executor.1:10536 blocked for more than 140 seconds. [ 1798.322103] Not tainted 4.19.211-syzkaller #0 [ 1798.327969] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1798.336823] syz-executor.1 D25552 10536 8145 0x80000000 [ 1798.342480] Call Trace: [ 1798.345912] __schedule+0x887/0x2040 [ 1798.349628] ? io_schedule_timeout+0x140/0x140 [ 1798.354231] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 1798.360412] schedule+0x8d/0x1b0 [ 1798.363804] wb_wait_for_completion+0x175/0x1f0 [ 1798.369291] ? wb_queue_work+0x4c0/0x4c0 [ 1798.373374] ? mark_held_locks+0xf0/0xf0 [ 1798.378653] ? wait_woken+0x250/0x250 [ 1798.382480] ? __lock_acquire+0x6de/0x3ff0 [ 1798.387594] __writeback_inodes_sb_nr+0x1df/0x270 [ 1798.392453] ? bdi_split_work_to_wbs+0xfa0/0xfa0 [ 1798.399154] ? cpumask_next+0x3c/0x40 [ 1798.402957] ? get_nr_dirty_inodes+0x19e/0x210 [ 1798.408802] try_to_writeback_inodes_sb+0xda/0x110 [ 1798.413745] ext4_nonda_switch+0x1aa/0x1f0 [ 1798.419523] ext4_da_write_begin+0x155/0x10e0 [ 1798.424022] ? mark_held_locks+0xa6/0xf0 [ 1798.428878] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 1798.434151] ? ext4_write_begin+0x1610/0x1610 [ 1798.439372] ? iov_iter_init+0x1d0/0x1d0 [ 1798.443437] generic_perform_write+0x1f8/0x4d0 [ 1798.448802] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 1798.453465] ? current_time+0x1c0/0x1c0 [ 1798.458191] ? lock_acquire+0x170/0x3c0 [ 1798.462220] __generic_file_write_iter+0x24b/0x610 [ 1798.467925] ext4_file_write_iter+0x2fe/0xf20 [ 1798.472592] ? set_next_entity+0xb52/0x1dc0 [ 1798.477593] ? ext4_file_open+0x600/0x600 [ 1798.482485] ? lock_downgrade+0x720/0x720 [ 1798.487317] ? lock_acquire+0x170/0x3c0 [ 1798.491290] ? follow_page_mask+0xe2b/0x1d00 [ 1798.496404] ? __phys_addr+0x9a/0x110 [ 1798.500222] __vfs_write+0x51b/0x770 [ 1798.503937] ? kernel_read+0x110/0x110 [ 1798.508696] ? follow_page_mask+0x1d00/0x1d00 [ 1798.513213] ? mark_held_locks+0xa6/0xf0 [ 1798.518044] ? io_schedule_timeout+0x140/0x140 [ 1798.522625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1798.528002] __kernel_write+0x109/0x370 [ 1798.532069] dump_emit+0x183/0x300 [ 1798.536574] ? zap_process+0x290/0x290 [ 1798.540472] elf_core_dump+0x33c0/0x4c10 [ 1798.545384] ? set_brk+0x170/0x170 [ 1798.549012] ? mark_held_locks+0xf0/0xf0 [ 1798.553084] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1798.559079] do_coredump+0x1d4e/0x2d60 [ 1798.562985] ? trace_hardirqs_off+0x64/0x200 [ 1798.568264] ? get_signal+0xc70/0x1f70 [ 1798.572169] ? cn_esc_printf+0x510/0x510 [ 1798.577986] ? try_to_wake_up+0x733/0x1050 [ 1798.582972] ? __sigqueue_alloc+0x18a/0x4c0 [ 1798.588108] ? debug_check_no_obj_freed+0x201/0x490 [ 1798.593127] ? lock_downgrade+0x720/0x720 [ 1798.598068] ? trace_hardirqs_off+0x64/0x200 [ 1798.602473] ? _raw_spin_unlock_irq+0x24/0x80 [ 1798.607619] get_signal+0xed9/0x1f70 [ 1798.611358] do_signal+0x8f/0x1670 [ 1798.615886] ? setup_sigcontext+0x820/0x820 [ 1798.620287] ? __do_page_fault+0x180/0xd60 [ 1798.625377] ? exit_to_usermode_loop+0x36/0x2a0 [ 1798.630052] exit_to_usermode_loop+0x204/0x2a0 [ 1798.635272] prepare_exit_to_usermode+0x277/0x2d0 [ 1798.640112] ? page_fault+0x8/0x30 [ 1798.643636] retint_user+0x8/0x18 [ 1798.648106] RIP: 0033: (null) [ 1798.651984] Code: Bad RIP value. [ 1798.656182] RSP: 002b:0000000020000308 EFLAGS: 00010217 [ 1798.661546] RAX: 0000000000000000 RBX: 00007f862dd28f80 RCX: 00007f862dc090f9 [ 1798.669434] RDX: 0000000020000340 RSI: 0000000020000300 RDI: 0000000015102000 [ 1798.677176] RBP: 00007f862dc64ae9 R08: 00000000200003c0 R09: 00000000200003c0 [ 1798.686092] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 1798.693370] R13: 00007ffe0de3d9cf R14: 00007f862c17b300 R15: 0000000000022000 [ 1798.701379] [ 1798.701379] Showing all locks held in the system: [ 1798.708170] 1 lock held by khungtaskd/1570: [ 1798.712482] #0: 0000000082f38d41 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 1798.721745] 1 lock held by in:imklog/7811: [ 1798.726481] #0: 00000000b80da43f (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 [ 1798.735078] 3 locks held by kworker/u4:12/28970: [ 1798.739832] #0: 00000000db936377 ((wq_completion)"writeback"){+.+.}, at: process_one_work+0x767/0x1570 [ 1798.750106] #1: 00000000491a6e86 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x79c/0x1570 [ 1798.761430] #2: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.770870] 1 lock held by syz-executor.3/10053: [ 1798.776170] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.786816] 1 lock held by syz-executor.2/10055: [ 1798.791688] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.801297] 1 lock held by syz-executor.0/10072: [ 1798.807395] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.816810] 1 lock held by syz-executor.3/10077: [ 1798.821627] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.831115] 1 lock held by syz-executor.2/10080: [ 1798.836315] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.845918] 1 lock held by syz-executor.0/10085: [ 1798.850671] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.860529] 1 lock held by syz-executor.5/10090: [ 1798.865818] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.875608] 1 lock held by syz-executor.4/10095: [ 1798.880367] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.890698] 1 lock held by syz-executor.1/10096: [ 1798.895559] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.905030] 1 lock held by syz-executor.2/10107: [ 1798.909778] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.919011] 1 lock held by syz-executor.5/10114: [ 1798.923771] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.932946] 1 lock held by syz-executor.2/10115: [ 1798.937783] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.946969] 1 lock held by syz-executor.0/10116: [ 1798.951742] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.960958] 1 lock held by syz-executor.4/10121: [ 1798.965806] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.975001] 1 lock held by syz-executor.1/10126: [ 1798.980224] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1798.989220] 1 lock held by syz-executor.5/10137: [ 1798.995084] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.004106] 1 lock held by syz-executor.5/10142: [ 1799.008906] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.018158] 1 lock held by syz-executor.4/10144: [ 1799.022895] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.031953] 1 lock held by syz-executor.2/10145: [ 1799.036768] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.045789] 1 lock held by syz-executor.0/10149: [ 1799.050540] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.059645] 1 lock held by syz-executor.2/10154: [ 1799.064439] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.073394] 1 lock held by syz-executor.1/10156: [ 1799.078226] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.087313] 1 lock held by syz-executor.0/10157: [ 1799.092061] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.101979] 1 lock held by syz-executor.1/10160: [ 1799.107002] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.116060] 1 lock held by syz-executor.5/10165: [ 1799.120807] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.129826] 1 lock held by syz-executor.5/10169: [ 1799.134775] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.143764] 1 lock held by syz-executor.4/10170: [ 1799.148546] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.157680] 1 lock held by syz-executor.1/10179: [ 1799.162459] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.171497] 1 lock held by syz-executor.1/10185: [ 1799.176318] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.185325] 1 lock held by syz-executor.5/10187: [ 1799.190157] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.200225] 1 lock held by syz-executor.5/10190: [ 1799.205059] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.214015] 1 lock held by syz-executor.2/10193: [ 1799.218844] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.228117] 1 lock held by syz-executor.2/10197: [ 1799.232857] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.242278] 1 lock held by syz-executor.1/10208: [ 1799.247118] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.256170] 1 lock held by syz-executor.0/10209: [ 1799.261012] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.270076] 1 lock held by syz-executor.5/10219: [ 1799.274912] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.283915] 1 lock held by syz-executor.5/10225: [ 1799.288703] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.298442] 1 lock held by syz-executor.1/10233: [ 1799.303215] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.312299] 1 lock held by syz-executor.2/10241: [ 1799.317115] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.326145] 1 lock held by syz-executor.2/10251: [ 1799.330893] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.340003] 1 lock held by syz-executor.5/10253: [ 1799.344928] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.353872] 1 lock held by syz-executor.4/10254: [ 1799.358736] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.367742] 1 lock held by syz-executor.0/10257: [ 1799.372598] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.381671] 1 lock held by syz-executor.1/10263: [ 1799.386483] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.395533] 1 lock held by syz-executor.1/10264: [ 1799.401055] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.410183] 1 lock held by syz-executor.4/10269: [ 1799.415027] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.424123] 1 lock held by syz-executor.0/10291: [ 1799.428933] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.439143] 1 lock held by syz-executor.0/10293: [ 1799.443886] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.452863] 1 lock held by syz-executor.1/10300: [ 1799.457673] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.466933] 1 lock held by syz-executor.1/10302: [ 1799.471686] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.480821] 3 locks held by syz-executor.1/10536: [ 1799.485770] #0: 000000001fd8c78b (sb_writers#3){.+.+}, at: do_coredump+0x2083/0x2d60 [ 1799.522260] #1: 000000006446b853 (&sb->s_type->i_mutex_key#10){+.+.}, at: ext4_file_write_iter+0x21f/0xf20 [ 1799.544308] #2: 00000000aa0a8c0e (&type->s_umount_key#36){++++}, at: try_to_writeback_inodes_sb+0x1d/0x110 [ 1799.554343] 1 lock held by syz-executor.5/11132: [ 1799.559295] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.568386] 1 lock held by syz-executor.1/11165: [ 1799.573187] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.582302] 1 lock held by syz-executor.5/11175: [ 1799.587127] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.596305] 1 lock held by syz-executor.2/11179: [ 1799.601044] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.611224] 1 lock held by syz-executor.5/11199: [ 1799.616073] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.625082] 1 lock held by syz-executor.1/11211: [ 1799.629851] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.638931] 1 lock held by syz-executor.5/11218: [ 1799.643677] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.653006] 1 lock held by syz-executor.5/11223: [ 1799.657817] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.666900] 1 lock held by syz-executor.1/11228: [ 1799.671640] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.680643] 1 lock held by syz-executor.5/11247: [ 1799.685482] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.694617] 1 lock held by syz-executor.1/11254: [ 1799.699395] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.709589] 1 lock held by syz-executor.5/11270: [ 1799.714578] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.723635] 1 lock held by syz-executor.1/11279: [ 1799.728423] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.737530] 1 lock held by syz-executor.5/11321: [ 1799.742289] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.751289] 1 lock held by syz-executor.1/11329: [ 1799.756554] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.765660] 1 lock held by syz-executor.5/11338: [ 1799.770447] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.779582] 1 lock held by syz-executor.5/11345: [ 1799.784498] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.793471] 1 lock held by syz-executor.5/11363: [ 1799.798275] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.807300] 1 lock held by syz-executor.5/11368: [ 1799.812866] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.821995] 1 lock held by syz-executor.5/11385: [ 1799.826944] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.836390] 1 lock held by syz-executor.5/11390: [ 1799.841142] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.850130] 1 lock held by syz-executor.5/11406: [ 1799.855216] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.864227] 1 lock held by syz-executor.5/11414: [ 1799.869117] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.878220] 1 lock held by syz-executor.5/11426: [ 1799.883035] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.892020] 1 lock held by syz-executor.1/11445: [ 1799.896857] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.905871] 1 lock held by syz-executor.5/11448: [ 1799.910718] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.920923] 1 lock held by syz-executor.3/11458: [ 1799.925774] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.935769] 1 lock held by syz-executor.5/11459: [ 1799.940618] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.949718] 1 lock held by syz-executor.1/11462: [ 1799.954547] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.963572] 1 lock held by syz-executor.5/11473: [ 1799.968403] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.977564] 1 lock held by syz-executor.5/11500: [ 1799.982534] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1799.991561] 1 lock held by syz-executor.1/11806: [ 1799.996462] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.005478] 1 lock held by syz-executor.5/12068: [ 1800.010232] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.020662] 1 lock held by syz-executor.1/12086: [ 1800.025480] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.034547] 1 lock held by syz-executor.5/12088: [ 1800.039292] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.048388] 1 lock held by syz-executor.5/12090: [ 1800.053216] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.062355] 1 lock held by syz-executor.0/12091: [ 1800.067350] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.076661] 1 lock held by syz-executor.5/12105: [ 1800.081417] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.090563] 1 lock held by syz-executor.5/12109: [ 1800.095485] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.104529] 1 lock held by syz-executor.5/12120: [ 1800.109279] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.119340] 1 lock held by syz-executor.5/12127: [ 1800.124181] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.133280] 1 lock held by syz-executor.5/12138: [ 1800.138131] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.147347] 1 lock held by syz-executor.5/12155: [ 1800.152205] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.161237] 1 lock held by syz-executor.5/12160: [ 1800.166067] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.175199] 1 lock held by syz-executor.5/12176: [ 1800.179958] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.188941] 1 lock held by syz-executor.5/12180: [ 1800.193691] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.203712] 1 lock held by syz-executor.4/12190: [ 1800.208514] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.217553] 1 lock held by syz-executor.5/12197: [ 1800.223108] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.232261] 1 lock held by syz-executor.1/12199: [ 1800.237249] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.246264] 1 lock held by syz-executor.5/12202: [ 1800.251153] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.260320] 1 lock held by syz-executor.1/12207: [ 1800.265146] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.274460] 1 lock held by syz-executor.5/12219: [ 1800.279205] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.288360] 1 lock held by syz-executor.5/12223: [ 1800.293111] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.302929] 1 lock held by syz-executor.1/12228: [ 1800.307767] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.316819] 1 lock held by syz-executor.2/12235: [ 1800.322321] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.331667] 1 lock held by syz-executor.1/12237: [ 1800.336520] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.345721] 1 lock held by syz-executor.0/12239: [ 1800.350480] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.359608] 1 lock held by syz-executor.2/12242: [ 1800.364466] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.373427] 1 lock held by syz-executor.5/12245: [ 1800.378246] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.387342] 1 lock held by syz-executor.5/12249: [ 1800.392109] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.401201] 1 lock held by syz-executor.1/12264: [ 1800.406033] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.415258] 1 lock held by syz-executor.5/12270: [ 1800.420035] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.430059] 1 lock held by syz-executor.2/12272: [ 1800.434894] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.443835] 1 lock held by syz-executor.1/12275: [ 1800.448657] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.458122] 1 lock held by syz-executor.5/12278: [ 1800.462872] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.471893] 1 lock held by syz-executor.5/12297: [ 1800.476774] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.486162] 1 lock held by syz-executor.5/12302: [ 1800.490994] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.500125] 1 lock held by syz-executor.1/12317: [ 1800.504959] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.514133] 1 lock held by syz-executor.5/12320: [ 1800.519018] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.529060] 1 lock held by syz-executor.5/12348: [ 1800.533840] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.542963] 1 lock held by syz-executor.5/12351: [ 1800.547856] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.556966] 1 lock held by syz-executor.5/12378: [ 1800.561715] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.570711] 1 lock held by syz-executor.5/12380: [ 1800.575975] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.585058] 1 lock held by syz-executor.3/12392: [ 1800.589809] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.598805] 1 lock held by syz-executor.1/12404: [ 1800.603648] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.612736] 1 lock held by syz-executor.5/12406: [ 1800.617819] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.626884] 1 lock held by syz-executor.5/12411: [ 1800.632351] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.641452] 1 lock held by syz-executor.1/12413: [ 1800.646280] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.655408] 1 lock held by syz-executor.3/12424: [ 1800.660182] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.669164] 1 lock held by syz-executor.5/12428: [ 1800.673907] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.682981] 1 lock held by syz-executor.5/12435: [ 1800.687796] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.696960] 1 lock held by syz-executor.1/12441: [ 1800.701716] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.710818] 1 lock held by syz-executor.2/12449: [ 1800.716093] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.725089] 1 lock held by syz-executor.5/12458: [ 1800.729829] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.740706] 1 lock held by syz-executor.1/12478: [ 1800.745502] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.754513] 1 lock held by syz-executor.5/12480: [ 1800.759255] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.768308] 1 lock held by syz-executor.5/12489: [ 1800.773075] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.782090] 1 lock held by syz-executor.1/12505: [ 1800.786932] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.796065] 1 lock held by syz-executor.5/12510: [ 1800.800889] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.809985] 1 lock held by syz-executor.5/12513: [ 1800.814976] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.823917] 1 lock held by syz-executor.3/12517: [ 1800.828762] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.839349] 1 lock held by syz-executor.5/12535: [ 1800.844117] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.853116] 1 lock held by syz-executor.1/12541: [ 1800.858044] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.867270] 1 lock held by syz-executor.5/12542: [ 1800.872021] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.881126] 1 lock held by syz-executor.1/12549: [ 1800.885943] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.894965] 1 lock held by syz-executor.3/12556: [ 1800.899713] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.908944] 1 lock held by syz-executor.5/12560: [ 1800.913702] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.922732] 1 lock held by syz-executor.5/12567: [ 1800.927594] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.937737] 1 lock held by syz-executor.1/12580: [ 1800.942497] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.951507] 1 lock held by syz-executor.1/12587: [ 1800.956483] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.965492] 1 lock held by syz-executor.4/12588: [ 1800.970301] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.979313] 1 lock held by syz-executor.3/12589: [ 1800.984059] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1800.993106] 1 lock held by syz-executor.5/12590: [ 1800.998159] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.007179] 1 lock held by syz-executor.3/12595: [ 1801.011934] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.021032] 1 lock held by syz-executor.5/12596: [ 1801.025833] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.034872] 1 lock held by syz-executor.4/12597: [ 1801.040383] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.050277] 1 lock held by syz-executor.1/12612: [ 1801.055101] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.064030] 1 lock held by syz-executor.4/12616: [ 1801.068947] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.101643] 1 lock held by syz-executor.5/12619: [ 1801.106659] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.115843] 1 lock held by syz-executor.1/12620: [ 1801.120591] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.129570] 1 lock held by syz-executor.4/12623: [ 1801.134679] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.144404] 1 lock held by syz-executor.5/12624: [ 1801.149178] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.158305] 1 lock held by syz-executor.3/12631: [ 1801.163117] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.172994] 1 lock held by syz-executor.3/12637: [ 1801.178076] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.187071] 1 lock held by syz-executor.5/12641: [ 1801.191812] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.200905] 1 lock held by syz-executor.0/12745: [ 1801.205846] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.214876] 1 lock held by syz-executor.0/12798: [ 1801.219736] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.228804] 1 lock held by syz-executor.3/12805: [ 1801.233546] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.242633] 1 lock held by syz-executor.4/12827: [ 1801.248149] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.257251] 1 lock held by syz-executor.4/12938: [ 1801.261999] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.270986] 1 lock held by syz-executor.4/12957: [ 1801.275824] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.285015] 1 lock held by syz-executor.2/12976: [ 1801.289759] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.298759] 1 lock held by syz-executor.1/12977: [ 1801.303503] #0: 00000000b19ea0fd (&sbi->s_writepages_rwsem){.+.+}, at: do_writepages+0xe5/0x290 [ 1801.312617] [ 1801.315465] ============================================= [ 1801.315465] [ 1801.322550] NMI backtrace for cpu 0 [ 1801.326277] CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 1801.333721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 1801.343102] Call Trace: [ 1801.345689] dump_stack+0x1fc/0x2ef [ 1801.349302] nmi_cpu_backtrace.cold+0x63/0xa2 [ 1801.353785] ? lapic_can_unplug_cpu+0x80/0x80 [ 1801.358261] nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 [ 1801.363519] watchdog+0x991/0xe60 [ 1801.366963] ? reset_hung_task_detector+0x30/0x30 [ 1801.371795] kthread+0x33f/0x460 [ 1801.375142] ? kthread_park+0x180/0x180 [ 1801.379100] ret_from_fork+0x24/0x30 [ 1801.383944] Sending NMI from CPU 0 to CPUs 1: [ 1801.389087] NMI backtrace for cpu 1 [ 1801.389093] CPU: 1 PID: 9705 Comm: kworker/u4:8 Not tainted 4.19.211-syzkaller #0 [ 1801.389098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 1801.389102] Workqueue: phy5 ieee80211_iface_work [ 1801.389107] RIP: 0010:rcu_is_watching+0x42/0xc0 [ 1801.389117] Code: 00 48 ba 00 00 00 00 00 fc ff df 89 c0 48 8d 3c c5 00 af cf 89 48 89 f9 48 c1 e9 03 80 3c 11 00 75 6d 48 03 1c c5 00 af cf 89 04 00 00 00 48 8d 6b 10 48 89 ef e8 5d c2 46 00 48 89 ea 48 b8 [ 1801.389120] RSP: 0018:ffff88809f8f7b60 EFLAGS: 00000286 [ 1801.389127] RAX: 0000000000000001 RBX: ffff8880ba122ac0 RCX: 1ffffffff139f5e1 [ 1801.389131] RDX: dffffc0000000000 RSI: ffffffff83771e31 RDI: ffffffff89cfaf08 [ 1801.389136] RBP: 0000000000000000 R08: 00000000ff6a6dd2 R09: 0000000000000000 [ 1801.389140] R10: 0000000000000005 R11: 0000000000000000 R12: ffff88809cc06740 [ 1801.389144] R13: dffffc0000000000 R14: ffff88809cc06740 R15: 1ffffffff13c1b30 [ 1801.389149] FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1801.389153] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1801.389157] CR2: 00007f7708881000 CR3: 00000000919a3000 CR4: 00000000003406e0 [ 1801.389162] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1801.389166] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1801.389168] Call Trace: [ 1801.389172] ieee80211_sta_active_ibss+0x26e/0x350 [ 1801.389175] ieee80211_ibss_work+0xae3/0xe10 [ 1801.389179] ? ieee80211_ibss_rx_queued_mgmt+0x18b0/0x18b0 [ 1801.389182] ? mark_held_locks+0xa6/0xf0 [ 1801.389185] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1801.389188] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1801.389192] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1801.389195] ieee80211_iface_work+0x7ba/0x8a0 [ 1801.389198] process_one_work+0x864/0x1570 [ 1801.389201] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 1801.389204] worker_thread+0x64c/0x1130 [ 1801.389207] ? process_one_work+0x1570/0x1570 [ 1801.389210] kthread+0x33f/0x460 [ 1801.389213] ? kthread_park+0x180/0x180 [ 1801.389216] ret_from_fork+0x24/0x30 [ 1801.390278] Kernel panic - not syncing: hung_task: blocked tasks [ 1801.590774] CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 1801.598208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 1801.607545] Call Trace: [ 1801.610122] dump_stack+0x1fc/0x2ef [ 1801.613733] panic+0x26a/0x50e [ 1801.616966] ? __warn_printk+0xf3/0xf3 [ 1801.620837] ? lapic_can_unplug_cpu+0x80/0x80 [ 1801.625332] ? ___preempt_schedule+0x16/0x18 [ 1801.629727] ? watchdog+0x991/0xe60 [ 1801.633358] ? nmi_trigger_cpumask_backtrace+0x15e/0x1f0 [ 1801.638795] watchdog+0x9a2/0xe60 [ 1801.642235] ? reset_hung_task_detector+0x30/0x30 [ 1801.647065] kthread+0x33f/0x460 [ 1801.650460] ? kthread_park+0x180/0x180 [ 1801.654423] ret_from_fork+0x24/0x30 [ 1801.658321] Kernel Offset: disabled [ 1801.661941] Rebooting in 86400 seconds..